CVE-2025-58763
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-09

Last updated on: 2025-09-18

Assigner: GitHub, Inc.

Description
Tautulli is a Python based monitoring and tracking tool for Plex Media Server. A command injection vulnerability in Tautulli v2.15.3 and prior allows attackers with administrative privileges to obtain remote code execution on the application server. This vulnerability requires the application to have been cloned from GitHub and installed manually. When Tautulli is cloned directly from GitHub and installed manually, the application manages updates and versioning through calls to the `git` command. In the code, this is performed through the `runGit` function in `versioncheck.py`. Since `shell=True` is passed to `subproces.Popen`, this call is vulnerable to subject to command injection, as shell characters within arguments will be passed to the underlying shell. A concrete location where this can be triggered is in the `checkout_git_branch` endpoint. This endpoint stores a user-supplied remote and branch name into the `GIT_REMOTE` and `GIT_BRANCH` configuration keys without sanitization. Downstream, these keys are then fetched and passed directly into `runGit` using a format string. Hence, code execution can be obtained by using `$()` interpolation in a command. Version 2.16.0 contains a fix for the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-09
Last Modified
2025-09-18
Generated
2026-05-07
AI Q&A
2025-09-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tautulli tautulli to 2.16.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a command injection flaw in Tautulli versions 2.15.3 and earlier when installed manually from GitHub. It occurs because the application executes git commands using Python's subprocess.Popen with shell=True, without sanitizing user-supplied inputs for git remote and branch names. An attacker with administrative privileges can exploit this by injecting shell commands via these inputs, leading to remote code execution on the server. The vulnerability is fixed in version 2.16.0. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability allows an attacker with administrative access to execute arbitrary commands on the Tautulli application server remotely. This can lead to full compromise of the server, including data theft, service disruption, or using the server as a foothold for further attacks. The impact on confidentiality, integrity, and availability is high. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if your Tautulli installation is version 2.15.3 or earlier and was cloned directly from GitHub and installed manually. You can verify the Tautulli version by running a command like `tautulli --version` or checking the version in the application interface. Additionally, you can inspect the configuration keys GIT_REMOTE and GIT_BRANCH for suspicious shell metacharacters or command substitution patterns such as `$()`. Since the vulnerability involves command injection via the checkout_git_branch endpoint, monitoring logs for unusual git commands or unexpected shell command executions may help detect exploitation attempts. There is no specific detection command provided, but reviewing the configuration and version is key. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Tautulli to version 2.16.0 or later, where this vulnerability has been fixed. If upgrading is not immediately possible, restrict administrative access to the Tautulli application to trusted users only, as the vulnerability requires administrative privileges. Avoid using manually cloned GitHub installations if possible, or ensure that inputs to the checkout_git_branch endpoint are sanitized to prevent command injection. Monitoring and restricting network access to the application server can also reduce risk. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart