Tautulli is a Python based monitoring and tracking tool for Plex Media Server. The `real_pms_image_proxy` endpoint in Tautulli v2.15.3 and prior is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. The `real_pms_image_proxy` is used to fetch an image directly from the backing Plex Media Server. The image to be fetched is specified through an `img` URL parameter, which can either be a URL or a file path. There is some validation ensuring that `img` begins with the prefix `interfaces/default/images` in order to be served from the local filesystem. However this can be bypassed by passing an `img` parameter which begins with a valid prefix, and then adjoining path traversal characters in order to reach files outside of intended directories. An attacker can exfiltrate files on the application file system, including the `tautulli.db` SQLite database containing active JWT tokens, as well as the `config.ini` file which contains the hashed admin password, the JWT token secret, and the Plex Media Server token and connection details. If the password is cracked, or if a valid JWT token is present in the database, an unauthenticated attacker can escalate their privileges to obtain administrative control over the application. Version 2.16.0 contains a fix for the issue.
References
Link | Resource |
---|---|
https://github.com/Tautulli/Tautulli/commit/ec77a70aafc555e1aad0d9981f719d1200c117f1 | Patch |
https://github.com/Tautulli/Tautulli/security/advisories/GHSA-r732-m675-wj7w | Exploit Vendor Advisory |
https://github.com/Tautulli/Tautulli/security/advisories/GHSA-r732-m675-wj7w | Exploit Vendor Advisory |
Configurations
History
18 Sep 2025, 17:23
Type | Values Removed | Values Added |
---|---|---|
First Time |
Tautulli tautulli
Tautulli |
|
CPE | cpe:2.3:a:tautulli:tautulli:*:*:*:*:*:*:*:* | |
References | () https://github.com/Tautulli/Tautulli/commit/ec77a70aafc555e1aad0d9981f719d1200c117f1 - Patch | |
References | () https://github.com/Tautulli/Tautulli/security/advisories/GHSA-r732-m675-wj7w - Exploit, Vendor Advisory |
10 Sep 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Tautulli/Tautulli/security/advisories/GHSA-r732-m675-wj7w - |
09 Sep 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-09 20:15
Updated : 2025-09-18 17:23
NVD link : CVE-2025-58761
Mitre link : CVE-2025-58761
CVE.ORG link : CVE-2025-58761
JSON object : View
Products Affected
tautulli
- tautulli
CWE
CWE-27
Path Traversal: 'dir/../../filename'