{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-58761","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-09-04T19:18:09.500Z","datePublished":"2025-09-09T19:59:17.329Z","dateUpdated":"2025-09-10T13:47:59.287Z"},"containers":{"cna":{"title":"Tautulli vulnerable to Unauthenticated Path Traversal in `real_pms_image_proxy`","problemTypes":[{"descriptions":[{"cweId":"CWE-27","lang":"en","description":"CWE-27: Path Traversal: 'dir/../../filename'","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/Tautulli/Tautulli/security/advisories/GHSA-r732-m675-wj7w","tags":["x_refsource_CONFIRM"],"url":"https://github.com/Tautulli/Tautulli/security/advisories/GHSA-r732-m675-wj7w"},{"name":"https://github.com/Tautulli/Tautulli/commit/ec77a70aafc555e1aad0d9981f719d1200c117f1","tags":["x_refsource_MISC"],"url":"https://github.com/Tautulli/Tautulli/commit/ec77a70aafc555e1aad0d9981f719d1200c117f1"}],"affected":[{"vendor":"Tautulli","product":"Tautulli","versions":[{"version":"< 2.16.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-09-09T19:59:17.329Z"},"descriptions":[{"lang":"en","value":"Tautulli is a Python based monitoring and tracking tool for Plex Media Server. The `real_pms_image_proxy` endpoint in Tautulli v2.15.3 and prior is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. The `real_pms_image_proxy` is used to fetch an image directly from the backing Plex Media Server. The image to be fetched is specified through an `img` URL parameter, which can either be a URL or a file path. There is some validation ensuring that `img` begins with the prefix `interfaces/default/images` in order to be served from the local filesystem. However this can be bypassed by passing an `img` parameter which begins with a valid prefix, and then adjoining path traversal characters in order to reach files outside of intended directories. An attacker can exfiltrate files on the application file system, including the `tautulli.db` SQLite database containing active JWT tokens, as well as the `config.ini` file which contains the hashed admin password, the JWT token secret, and the Plex Media Server token and connection details. If the password is cracked, or if a valid JWT token is present in the database, an unauthenticated attacker can escalate their privileges to obtain administrative control over the application. Version 2.16.0 contains a fix for the issue."}],"source":{"advisory":"GHSA-r732-m675-wj7w","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/Tautulli/Tautulli/security/advisories/GHSA-r732-m675-wj7w","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-10T13:47:50.599702Z","id":"CVE-2025-58761","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-10T13:47:59.287Z"}}]}}