Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16522 | Navidrome allows SQL Injection via role parameter |
Github GHSA |
GHSA-5wgp-vjxm-3x2r | Navidrome allows SQL Injection via role parameter |
Tue, 26 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:navidrome:navidrome:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 30 May 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 May 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Navidrome is an open source web-based music collection server and streamer. Versions 0.55.0 through 0.55.2 have a vulnerability due to improper input validation on the `role` parameter within the API endpoint `/api/artist`. Attackers can exploit this flaw to inject arbitrary SQL queries, potentially gaining unauthorized access to the backend database and compromising sensitive user information. Version 0.56.0 contains a patch for the issue. | |
| Title | Navidrome allows SQL Injection via role parameter | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-05-30T20:45:32.298Z
Reserved: 2025-05-28T18:49:07.584Z
Link: CVE-2025-48949
Updated: 2025-05-30T20:45:28.503Z
Status : Analyzed
Published: 2025-05-30T20:15:44.083
Modified: 2025-08-26T14:12:51.913
Link: CVE-2025-48949
No data.
OpenCVE Enrichment
Updated: 2025-06-24T09:44:17Z
EUVD
Github GHSA