CVE-2025-58760
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-09

Last updated on: 2025-09-18

Assigner: GitHub, Inc.

Description
Tautulli is a Python based monitoring and tracking tool for Plex Media Server. The `/image` API endpoint in Tautulli v2.15.3 and earlier is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. In Tautulli, the `/image` API endpoint is used to serve static images from the application's data directory to users. This endpoint can be accessed without authentication, and its intended purpose is for server background images and icons within the user interface. Attackers can exfiltrate files from the application file system, including the `tautulli.db` SQLite database containing active JWT tokens, as well as the `config.ini` file which contains the hashed admin password, the JWT token secret, and the Plex Media Server token and connection details. If the password is cracked, or if a valid JWT token is present in the database, an unauthenticated attacker can escalate their privileges to obtain administrative control over the application. Version 2.16.0 contains a fix for the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-09
Last Modified
2025-09-18
Generated
2026-05-07
AI Q&A
2025-09-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tautulli tautulli to 2.16.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-23 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a path traversal flaw in the `/image` API endpoint of Tautulli versions 2.15.3 and earlier. The endpoint serves static images from the application's data directory without requiring authentication. Due to improper sanitization of user input in the URL path, an attacker can manipulate the path to access arbitrary files on the server's filesystem outside the intended directory. This allows unauthenticated attackers to read sensitive files such as the `tautulli.db` database containing active JWT tokens and the `config.ini` file containing hashed admin passwords and secret tokens. Exploiting this can lead to privilege escalation and administrative control over the application. The issue was fixed in version 2.16.0. [1]


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized disclosure of sensitive information stored on the server, such as authentication tokens, hashed passwords, and configuration secrets. Attackers can use this information to escalate privileges and gain administrative control over the Tautulli application without authentication. This compromises the security and integrity of the application and potentially the Plex Media Server environment it monitors. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending crafted HTTP GET requests to the vulnerable Tautulli server targeting the `/image` API endpoint with path traversal sequences. For example, a command using curl to test the vulnerability is: `curl -i http://<tautulli-server>/image/images/../../../../../../../../../etc/passwd`. If the response returns HTTP 200 with content type `image/png` and includes contents of the targeted file (e.g., `/etc/passwd`), the system is vulnerable. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Tautulli to version 2.16.0 or later, where the vulnerability is fixed. The fix involves validating image paths to ensure they are subdirectories of the intended resource directory, preventing path traversal. If upgrading immediately is not possible, restrict network access to the Tautulli server to trusted users only and monitor for suspicious requests targeting the `/image` endpoint. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart