CVE-2025-62382
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-15

Last updated on: 2025-10-16

Assigner: GitHub, Inc.

Description
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.2, Frigate's export workflow allows an authenticated operator to nominate any filesystem location as the thumbnail source for a video export. Because that path is copied verbatim into the publicly served clips directory, the feature can be abused to read arbitrary files that reside on the host running Frigate. In practice, a low-privilege user with API access can pivot from viewing camera footage to exfiltrating sensitive configuration files, secrets, or user data from the appliance itself. This behavior violates the principle of least privilege for the export subsystem and turns a convenience feature into a direct information disclosure vector, with exploitation hinging on a short race window while the background exporter copies the chosen file into place before cleanup runs. This vulnerability is fixed in 0.16.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-15
Last Modified
2025-10-16
Generated
2026-05-07
AI Q&A
2025-10-15
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
blakeblackshear frigate 0.16.1
blakeblackshear frigate 0.16.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-73 The product allows user input to control or influence paths or file names that are used in filesystem operations.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Frigate (prior to version 0.16.2) allows an authenticated user to specify any filesystem location as the thumbnail source for a video export. Because the specified path is copied directly into the publicly accessible clips directory, an attacker with low privileges can exploit this to read arbitrary files on the host system. This can lead to unauthorized disclosure of sensitive files such as configuration files, secrets, or user data. The exploit relies on a short timing window during the file copy process before cleanup occurs.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized information disclosure by allowing a low-privilege user to access sensitive files on the host running Frigate. This could result in exposure of confidential configuration data, secrets, or user information, potentially compromising the security and privacy of the system and its users.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Frigate to version 0.16.2 or later, as this version contains the fix for the vulnerability. Until the upgrade is applied, restrict API access to trusted users only to prevent exploitation by low-privilege users.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart