Skip to main content

CVE-2025-10669: Unrestricted Upload in Airsonic-Advanced

Medium
VulnerabilityCVE-2025-10669cvecve-2025-10669
Published: Thu Sep 18 2025 (09/18/2025, 13:32:09 UTC)
Source: CVE Database V5
Product: Airsonic-Advanced

Description

A vulnerability was detected in Airsonic-Advanced up to 10.6.0. This vulnerability affects unknown code of the component Playlist Upload Handler. Performing manipulation results in unrestricted upload. It is possible to initiate the attack remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 09/18/2025, 13:38:22 UTC

Technical Analysis

CVE-2025-10669 is a medium-severity vulnerability affecting Airsonic-Advanced versions up to 10.6.0. The flaw resides in the Playlist Upload Handler component, where improper input validation allows an attacker to perform unrestricted file uploads remotely without requiring user interaction or authentication. This means an attacker can upload arbitrary files, potentially including malicious executables or scripts, to the server hosting Airsonic-Advanced. The vulnerability is exploitable over the network with low complexity, as no privileges or user interaction are needed. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although the exploit is publicly available, there are no known exploits in the wild at the time of publication. The lack of patch links suggests that a fix may not yet be released or publicly documented. This vulnerability could allow attackers to compromise the server by uploading web shells or malware, leading to data breaches, service disruption, or further lateral movement within the network. Airsonic-Advanced is a media streaming server software, often used by organizations for managing and streaming audio content, which may be deployed in corporate, educational, or media environments.

Potential Impact

For European organizations using Airsonic-Advanced, this vulnerability poses a significant risk. An attacker exploiting this flaw could upload malicious files to internal or public-facing servers, leading to unauthorized access, data leakage, or service disruption. Given the media-centric nature of Airsonic-Advanced, organizations relying on it for content distribution or internal media management could face operational interruptions. Confidentiality could be compromised if sensitive media or user data is accessed or exfiltrated. Integrity and availability impacts are also possible if attackers replace or delete files or deploy ransomware or other destructive payloads. The medium CVSS score reflects that while the vulnerability is serious, it may require some level of network access to the vulnerable service, which might be restricted in some environments. However, the lack of authentication and user interaction requirements increases the risk, especially for organizations exposing Airsonic-Advanced servers to the internet or untrusted networks. European entities in sectors such as media, education, and small to medium enterprises using this software should prioritize assessment and mitigation to prevent potential exploitation.

Mitigation Recommendations

Organizations should immediately audit their Airsonic-Advanced deployments to identify affected versions (10.0 through 10.6.0). Until an official patch is released, practical mitigations include restricting network access to the Airsonic-Advanced server by implementing firewall rules that limit inbound connections to trusted IP addresses or internal networks only. Disabling or restricting the Playlist Upload Handler functionality, if configurable, can reduce the attack surface. Monitoring logs for unusual upload activity or unexpected file types can help detect exploitation attempts. Employing web application firewalls (WAFs) with rules to block suspicious file uploads or malformed requests targeting the upload endpoint is recommended. Organizations should also prepare to apply patches promptly once available and consider isolating the Airsonic-Advanced server in a segmented network zone to limit potential lateral movement. Regular backups of media content and configuration data should be maintained to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-18T05:34:44.815Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cc0b2216bc0da717cded50

Added to database: 9/18/2025, 1:37:38 PM

Last enriched: 9/18/2025, 1:38:22 PM

Last updated: 9/18/2025, 3:34:54 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats