CVE-2026-25643

Source
https://cve.org/CVERecord?id=CVE-2026-25643
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25643.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25643
Aliases
  • GHSA-4c97-5jmr-8f6x
Published
2026-02-06T19:16:26.005Z
Modified
2026-04-10T05:40:41.677677Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Frigate Affected by Authenticated Remote Command Execution (RCE) and Container Escape
Details

Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application does not sanitize user input in the video stream configuration (config.yaml), allowing direct injection of system commands via the exec: directive. The go2rtc service executes these commands without restrictions. This vulnerability is only exploitable by an administrator or users who have exposed their Frigate install to the open internet with no authentication which allows anyone full administrative control. This vulnerability is fixed in 0.16.4.

Database specific
{
    "cwe_ids": [
        "CWE-250",
        "CWE-269",
        "CWE-668",
        "CWE-78"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25643.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/blakeblackshear/frigate

Affected ranges

Type
GIT
Repo
https://github.com/blakeblackshear/frigate
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.1.2
v0.*
v0.0.1
v0.1.0
v0.1.1
v0.10.0
v0.10.1
v0.11.0
v0.11.1
v0.12.0
v0.12.1
v0.13.0
v0.13.1
v0.13.2
v0.15.1
v0.15.2
v0.16.1
v0.16.2
v0.16.3
v0.2.0
v0.2.0-beta
v0.2.1
v0.2.2
v0.2.2-beta
v0.3.0
v0.5.0
v0.5.0-rc2
v0.5.0-rc4
v0.5.1
v0.5.2
v0.6.0
v0.6.0-rc1
v0.6.0-rc2
v0.6.0-rc3
v0.6.1
v0.7.0
v0.7.1
v0.7.2
v0.7.3
v0.8.0
v0.8.1
v0.8.2
v0.8.3
v0.8.4
v0.9.0
v0.9.1
v0.9.2
v0.9.3
v0.9.4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25643.json"