CVE-2023-47619: CWE-918: Server-Side Request Forgery (SSRF) in advplyr audiobookshelf
Audiobookshelf is a self-hosted audiobook and podcast server. In versions 2.4.3 and prior, users with the update permission are able to read arbitrary files, delete arbitrary files and send a GET request to arbitrary URLs and read the response. This issue may lead to Information Disclosure. As of time of publication, no patches are available.
AI Analysis
Technical Summary
CVE-2023-47619 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting the advplyr audiobookshelf software, a self-hosted audiobook and podcast server. This vulnerability exists in versions 2.4.3 and earlier. Users with the 'update' permission can exploit this flaw to perform unauthorized actions including reading arbitrary files, deleting arbitrary files, and sending GET requests to arbitrary URLs with the ability to read the responses. SSRF vulnerabilities allow attackers to make the server perform unintended requests, potentially accessing internal or protected resources. In this case, the vulnerability also enables arbitrary file operations, which significantly increases the risk. The CVSS v3.1 score is 8.1 (high), reflecting the network attack vector, low attack complexity, required privileges (update permission), no user interaction, and high impact on confidentiality and integrity but no impact on availability. No patches are currently available, increasing the urgency for mitigation. The vulnerability is classified under CWE-918 (SSRF) and CWE-200 (Information Exposure), indicating that it can lead to sensitive data disclosure and unauthorized manipulation of server files. Although no known exploits in the wild have been reported yet, the potential for significant damage exists given the nature of the flaw and the permissions required to exploit it. Audiobookshelf is typically deployed in self-hosted environments, often within organizational intranets or private networks, which could be targeted by insiders or attackers who have gained limited access.
Potential Impact
For European organizations using audiobookshelf, this vulnerability poses a serious risk to confidentiality and integrity of data. Attackers with update permissions could exfiltrate sensitive files, including configuration files or user data, potentially exposing personal or proprietary information. The ability to delete arbitrary files could disrupt service availability or cause data loss, impacting business continuity. SSRF could also be leveraged to pivot attacks into internal networks, accessing internal services not exposed externally, which is particularly concerning for organizations with sensitive internal infrastructure. Given the self-hosted nature of audiobookshelf, organizations that use it for internal media distribution or as part of employee resources could face insider threats or lateral movement by attackers. The lack of a patch means organizations must rely on compensating controls to mitigate risk. The impact is heightened in regulated environments within Europe, such as those governed by GDPR, where data breaches can lead to significant fines and reputational damage.
Mitigation Recommendations
Since no official patches are available, European organizations should implement several specific mitigations: 1) Restrict update permissions strictly to trusted administrators and minimize the number of users with this privilege. 2) Implement network segmentation to isolate the audiobookshelf server from sensitive internal systems and limit its ability to make outbound requests to only necessary destinations using firewall rules or proxy filtering. 3) Monitor and log all update permission activities and outgoing requests from the audiobookshelf server to detect suspicious behavior indicative of exploitation attempts. 4) Use web application firewalls (WAFs) or intrusion detection systems (IDS) configured to detect SSRF patterns and anomalous file access or deletion attempts. 5) Regularly back up audiobookshelf data and configuration files to enable recovery in case of file deletion or corruption. 6) Consider deploying the audiobookshelf service in a hardened container or virtual machine with strict access controls and minimal privileges. 7) Stay informed on vendor updates and apply patches promptly once available. 8) Conduct internal security audits and penetration testing focusing on SSRF and file operation vulnerabilities in audiobookshelf deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2023-47619: CWE-918: Server-Side Request Forgery (SSRF) in advplyr audiobookshelf
Description
Audiobookshelf is a self-hosted audiobook and podcast server. In versions 2.4.3 and prior, users with the update permission are able to read arbitrary files, delete arbitrary files and send a GET request to arbitrary URLs and read the response. This issue may lead to Information Disclosure. As of time of publication, no patches are available.
AI-Powered Analysis
Technical Analysis
CVE-2023-47619 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting the advplyr audiobookshelf software, a self-hosted audiobook and podcast server. This vulnerability exists in versions 2.4.3 and earlier. Users with the 'update' permission can exploit this flaw to perform unauthorized actions including reading arbitrary files, deleting arbitrary files, and sending GET requests to arbitrary URLs with the ability to read the responses. SSRF vulnerabilities allow attackers to make the server perform unintended requests, potentially accessing internal or protected resources. In this case, the vulnerability also enables arbitrary file operations, which significantly increases the risk. The CVSS v3.1 score is 8.1 (high), reflecting the network attack vector, low attack complexity, required privileges (update permission), no user interaction, and high impact on confidentiality and integrity but no impact on availability. No patches are currently available, increasing the urgency for mitigation. The vulnerability is classified under CWE-918 (SSRF) and CWE-200 (Information Exposure), indicating that it can lead to sensitive data disclosure and unauthorized manipulation of server files. Although no known exploits in the wild have been reported yet, the potential for significant damage exists given the nature of the flaw and the permissions required to exploit it. Audiobookshelf is typically deployed in self-hosted environments, often within organizational intranets or private networks, which could be targeted by insiders or attackers who have gained limited access.
Potential Impact
For European organizations using audiobookshelf, this vulnerability poses a serious risk to confidentiality and integrity of data. Attackers with update permissions could exfiltrate sensitive files, including configuration files or user data, potentially exposing personal or proprietary information. The ability to delete arbitrary files could disrupt service availability or cause data loss, impacting business continuity. SSRF could also be leveraged to pivot attacks into internal networks, accessing internal services not exposed externally, which is particularly concerning for organizations with sensitive internal infrastructure. Given the self-hosted nature of audiobookshelf, organizations that use it for internal media distribution or as part of employee resources could face insider threats or lateral movement by attackers. The lack of a patch means organizations must rely on compensating controls to mitigate risk. The impact is heightened in regulated environments within Europe, such as those governed by GDPR, where data breaches can lead to significant fines and reputational damage.
Mitigation Recommendations
Since no official patches are available, European organizations should implement several specific mitigations: 1) Restrict update permissions strictly to trusted administrators and minimize the number of users with this privilege. 2) Implement network segmentation to isolate the audiobookshelf server from sensitive internal systems and limit its ability to make outbound requests to only necessary destinations using firewall rules or proxy filtering. 3) Monitor and log all update permission activities and outgoing requests from the audiobookshelf server to detect suspicious behavior indicative of exploitation attempts. 4) Use web application firewalls (WAFs) or intrusion detection systems (IDS) configured to detect SSRF patterns and anomalous file access or deletion attempts. 5) Regularly back up audiobookshelf data and configuration files to enable recovery in case of file deletion or corruption. 6) Consider deploying the audiobookshelf service in a hardened container or virtual machine with strict access controls and minimal privileges. 7) Stay informed on vendor updates and apply patches promptly once available. 8) Conduct internal security audits and penetration testing focusing on SSRF and file operation vulnerabilities in audiobookshelf deployments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2023-11-07T16:57:49.243Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f67ff0acd01a24926457a
Added to database: 5/22/2025, 6:07:59 PM
Last enriched: 7/8/2025, 8:26:44 AM
Last updated: 8/17/2025, 6:20:33 AM
Views: 9
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.