CVE-2025-48949

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-48949
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-48949.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-48949
Aliases
Published
2025-05-30T19:40:51.355Z
Modified
2025-12-05T10:18:21.296740Z
Severity
  • 8.9 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P CVSS Calculator
Summary
Navidrome allows SQL Injection via role parameter
Details

Navidrome is an open source web-based music collection server and streamer. Versions 0.55.0 through 0.55.2 have a vulnerability due to improper input validation on the role parameter within the API endpoint /api/artist. Attackers can exploit this flaw to inject arbitrary SQL queries, potentially gaining unauthorized access to the backend database and compromising sensitive user information. Version 0.56.0 contains a patch for the issue.

Database specific
{
    "cwe_ids": [
        "CWE-89"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/48xxx/CVE-2025-48949.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/navidrome/navidrome

Affected ranges

Type
GIT
Repo
https://github.com/navidrome/navidrome
Events

Affected versions

v0.*

v0.55.0
v0.55.1
v0.55.2

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-48949.json"