Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16433 | Navidrome Transcoding Permission Bypass Vulnerability Report |
Github GHSA |
GHSA-f238-rggp-82m3 | Navidrome Transcoding Permission Bypass Vulnerability Report |
Tue, 26 Aug 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:navidrome:navidrome:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 30 May 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 May 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Navidrome is an open source web-based music collection server and streamer. A permission verification flaw in versions prior to 0.56.0 allows any authenticated regular user to bypass authorization checks and perform administrator-only transcoding configuration operations, including creating, modifying, and deleting transcoding settings. In the threat model where administrators are trusted but regular users are not, this vulnerability represents a significant security risk when transcoding is enabled. Version 0.56.0 patches the issue. | |
| Title | Navidrome Transcoding Permission Bypass Vulnerability Report | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-05-30T20:44:14.912Z
Reserved: 2025-05-28T18:49:07.583Z
Link: CVE-2025-48948
Updated: 2025-05-30T20:44:10.405Z
Status : Analyzed
Published: 2025-05-30T20:15:43.910
Modified: 2025-08-26T14:17:42.403
Link: CVE-2025-48948
No data.
OpenCVE Enrichment
Updated: 2025-06-24T09:44:17Z
EUVD
Github GHSA