Untriaged
Permalink
CVE-2026-25578
6.1 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): NONE
Activity log
- Created suggestion
Navidrome is vulnerable to XSS via comment from song metadata
Navidrome is an open source web-based music collection server and streamer. Prior to version 0.60.0, a cross-site scripting vulnerability in the frontend allows a malicious attacker to inject code through the comment metadata of a song to exfiltrate user credentials. This issue has been patched in version 0.60.0.
References
-
https://github.com/navidrome/navidrome/security/advisories/GHSA-rh3r-8pxm-hg4w x_refsource_CONFIRM
-
https://github.com/navidrome/navidrome/releases/tag/v0.60.0 x_refsource_MISC
Affected products
navidrome
- ==< 0.60.0
Package maintainers
-
@aciceri Andrea Ciceri <andrea.ciceri@autistici.org>
-
@squalus squalus <squalus@squalus.net>
-
@tebriel tebriel <tebriel@frodux.in>