CVE-2025-58760

Tautulli is a Python based monitoring and tracking tool for Plex Media Server. The `/image` API endpoint in Tautulli v2.15.3 and earlier is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. In Tautulli, the `/image` API endpoint is used to serve static images from the application's data directory to users. This endpoint can be accessed without authentication, and its intended purpose is for server background images and icons within the user interface. Attackers can exfiltrate files from the application file system, including the `tautulli.db` SQLite database containing active JWT tokens, as well as the `config.ini` file which contains the hashed admin password, the JWT token secret, and the Plex Media Server token and connection details. If the password is cracked, or if a valid JWT token is present in the database, an unauthenticated attacker can escalate their privileges to obtain administrative control over the application. Version 2.16.0 contains a fix for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tautulli:tautulli:*:*:*:*:*:*:*:*

History

18 Sep 2025, 17:30

Type Values Removed Values Added
CPE cpe:2.3:a:tautulli:tautulli:*:*:*:*:*:*:*:*
First Time Tautulli tautulli
Tautulli
References () https://github.com/Tautulli/Tautulli/commit/47566128e2e5dde98980d59b7a51b98173bc0b40 - () https://github.com/Tautulli/Tautulli/commit/47566128e2e5dde98980d59b7a51b98173bc0b40 - Patch
References () https://github.com/Tautulli/Tautulli/security/advisories/GHSA-8g4r-8f3f-hghp - () https://github.com/Tautulli/Tautulli/security/advisories/GHSA-8g4r-8f3f-hghp - Exploit, Vendor Advisory

09 Sep 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-09 20:15

Updated : 2025-09-18 17:30


NVD link : CVE-2025-58760

Mitre link : CVE-2025-58760

CVE.ORG link : CVE-2025-58760


JSON object : View

Products Affected

tautulli

  • tautulli
CWE
CWE-23

Relative Path Traversal