CVE-2025-64178

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-64178
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64178.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-64178
Aliases
Published
2025-11-06T21:46:58.994Z
Modified
2025-12-05T10:21:24.643731Z
Severity
  • 8.9 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H CVSS Calculator
Summary
Jellysweep uses uncontrolled data in image cache API endpoint
Details

Jellysweep is a cleanup tool for the Jellyfin media server. In versions 0.12.1 and below, /api/images/cache, used to download media posters from the server, accepted a URL parameter that was directly passed to the cache package, which downloaded the poster from this URL. This URL parameter can be used to make the Jellysweep server download arbitrary content. The API endpoint can only be used by authenticated users. This issue is fixed in version 0.13.0.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64178.json",
    "cwe_ids": [
        "CWE-918"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/jon4hz/jellysweep

Affected ranges

Type
GIT
Repo
https://github.com/jon4hz/jellysweep
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0
v0.10.0
v0.10.1
v0.10.2
v0.10.3
v0.11.0
v0.12.0
v0.12.1
v0.2.0
v0.3.0
v0.4.0
v0.5.0
v0.6.0
v0.7.0
v0.8.0
v0.9.0