Description
Streama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a combination of path traversal and server-side request forgery (SSRF) vulnerabilities in that allow an authenticated attacker to write arbitrary files to the server filesystem. The issue exists in the subtitle download functionality, where user-controlled parameters are used to fetch remote content and construct file paths without proper validation. By supplying a crafted subtitle download URL and a path traversal sequence in the file name, an attacker can write files to arbitrary locations on the server, potentially leading to remote code execution.
References (3)
Core 3
Core References
Various Sources technical-description
exploit
https://chocapikk.com/posts/2025/streama-path-traversal-ssrf/
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/streama-subtitle-download-path-traversal-and-ssrf-leading-to-arbitrary-file-write
Scores
CVSS v4
8.7
EPSS
0.0067
EPSS Percentile
71.3%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-22
CWE-918
Status
published
Products (3)
Streama/Streama
1.10.0 - 1.10.5
Streama/Streama
b7c8767d25634e159f9e8844230465f29c16efc8
Streama/Streama
commit b7c8767
Published
Dec 18, 2025
Tracked Since
Feb 18, 2026