CVE-2025-13131
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-13

Last updated on: 2025-11-13

Assigner: VulDB

Description
A vulnerability was found in Sonarr 4.0.15.2940. The impacted element is an unknown function of the file C:\ProgramData\Sonarr\bin\Sonarr.Console.exe of the component Service. Performing manipulation results in incorrect default permissions. The attack is only possible with local access. The vendor confirms this vulnerability but classifies it as a "low severity issue due to the default service user being used as it would either require someone to intentionally change the service to a highly privileged account or an attacker would need an admin level account". It is planned to fix this issue in the next major release v5.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-13
Last Modified
2025-11-13
Generated
2026-05-07
AI Q&A
2025-11-13
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sonarr sonarr 4.0.15.2940
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
CWE-276 During installation, installed file permissions are set to allow anyone to modify those files.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Sonarr 4.0.15.2940 involves incorrect default permissions set by an unknown function in the Service component (Sonarr.Console.exe). It requires local access and either an intentional change to a highly privileged service account or an attacker having admin-level access to exploit it. The vendor considers it low severity due to these constraints and plans to fix it in the next major release (v5).


How can this vulnerability impact me? :

If exploited, this vulnerability could allow an attacker with local and administrative access to gain elevated privileges or control over the Sonarr service due to incorrect default permissions. However, exploitation requires either intentional misconfiguration or admin-level access, limiting the risk to environments where such conditions exist.


What immediate steps should I take to mitigate this vulnerability?

Since the vulnerability involves incorrect default permissions in Sonarr 4.0.15.2940 and requires local access with at least a low privileged account, immediate mitigation steps include ensuring that the Sonarr service is not running under a highly privileged account, maintaining strict local access controls, and monitoring for any unauthorized changes to service permissions. Additionally, plan to upgrade to the next major release v5 when it becomes available, as it will include a fix for this issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart