CVE-2025-25205

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-25205
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-25205.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-25205
Aliases
  • GHSA-pg8v-5jcv-wrvw
Published
2025-02-12T18:16:01Z
Modified
2025-10-22T18:45:02.562731Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H CVSS Calculator
Summary
Remote Authentication-Bypass can lead to server crash or limited information disclosure due to faulty pattern matching
Details

Audiobookshelf is a self-hosted audiobook and podcast server. Starting in version 2.17.0 and prior to version 2.19.1, a flaw in the authentication bypass logic allows unauthenticated requests to match certain unanchored regex patterns in the URL. Attackers can craft URLs containing substrings like "/api/items/1/cover" in a query parameter (?r=/api/items/1/cover) to partially bypass authentication or trigger server crashes under certain routes. This could lead to information disclosure of otherwise protected data and, in some cases, a complete denial of service (server crash) if downstream code expects an authenticated user object. Version 2.19.1 contains a patch for the issue.

Database specific
{
    "cwe_ids": [
        "CWE-202",
        "CWE-287",
        "CWE-400"
    ]
}
References

Affected packages

Git / github.com/advplyr/audiobookshelf

Affected ranges

Type
GIT
Repo
https://github.com/advplyr/audiobookshelf
Events

Affected versions

v2.*

v2.17.0
v2.17.1
v2.17.2
v2.17.3
v2.17.4
v2.17.5
v2.17.6
v2.17.7
v2.18.0
v2.18.1
v2.19.0