CVE-2025-10669: Unrestricted Upload in Airsonic-Advanced
A vulnerability was detected in Airsonic-Advanced up to 10.6.0. This vulnerability affects unknown code of the component Playlist Upload Handler. Performing manipulation results in unrestricted upload. It is possible to initiate the attack remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-10669 is a medium-severity vulnerability affecting Airsonic-Advanced versions up to 10.6.0. The flaw resides in the Playlist Upload Handler component, where improper input validation allows an attacker to perform unrestricted file uploads remotely without requiring user interaction or authentication. This means an attacker can upload arbitrary files, potentially including malicious executables or scripts, to the server hosting Airsonic-Advanced. The vulnerability is exploitable over the network with low complexity, as no privileges or user interaction are needed. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although the exploit is publicly available, there are no known exploits in the wild at the time of publication. The lack of patch links suggests that a fix may not yet be released or publicly documented. This vulnerability could allow attackers to compromise the server by uploading web shells or malware, leading to data breaches, service disruption, or further lateral movement within the network. Airsonic-Advanced is a media streaming server software, often used by organizations for managing and streaming audio content, which may be deployed in corporate, educational, or media environments.
Potential Impact
For European organizations using Airsonic-Advanced, this vulnerability poses a significant risk. An attacker exploiting this flaw could upload malicious files to internal or public-facing servers, leading to unauthorized access, data leakage, or service disruption. Given the media-centric nature of Airsonic-Advanced, organizations relying on it for content distribution or internal media management could face operational interruptions. Confidentiality could be compromised if sensitive media or user data is accessed or exfiltrated. Integrity and availability impacts are also possible if attackers replace or delete files or deploy ransomware or other destructive payloads. The medium CVSS score reflects that while the vulnerability is serious, it may require some level of network access to the vulnerable service, which might be restricted in some environments. However, the lack of authentication and user interaction requirements increases the risk, especially for organizations exposing Airsonic-Advanced servers to the internet or untrusted networks. European entities in sectors such as media, education, and small to medium enterprises using this software should prioritize assessment and mitigation to prevent potential exploitation.
Mitigation Recommendations
Organizations should immediately audit their Airsonic-Advanced deployments to identify affected versions (10.0 through 10.6.0). Until an official patch is released, practical mitigations include restricting network access to the Airsonic-Advanced server by implementing firewall rules that limit inbound connections to trusted IP addresses or internal networks only. Disabling or restricting the Playlist Upload Handler functionality, if configurable, can reduce the attack surface. Monitoring logs for unusual upload activity or unexpected file types can help detect exploitation attempts. Employing web application firewalls (WAFs) with rules to block suspicious file uploads or malformed requests targeting the upload endpoint is recommended. Organizations should also prepare to apply patches promptly once available and consider isolating the Airsonic-Advanced server in a segmented network zone to limit potential lateral movement. Regular backups of media content and configuration data should be maintained to enable recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2025-10669: Unrestricted Upload in Airsonic-Advanced
Description
A vulnerability was detected in Airsonic-Advanced up to 10.6.0. This vulnerability affects unknown code of the component Playlist Upload Handler. Performing manipulation results in unrestricted upload. It is possible to initiate the attack remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10669 is a medium-severity vulnerability affecting Airsonic-Advanced versions up to 10.6.0. The flaw resides in the Playlist Upload Handler component, where improper input validation allows an attacker to perform unrestricted file uploads remotely without requiring user interaction or authentication. This means an attacker can upload arbitrary files, potentially including malicious executables or scripts, to the server hosting Airsonic-Advanced. The vulnerability is exploitable over the network with low complexity, as no privileges or user interaction are needed. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although the exploit is publicly available, there are no known exploits in the wild at the time of publication. The lack of patch links suggests that a fix may not yet be released or publicly documented. This vulnerability could allow attackers to compromise the server by uploading web shells or malware, leading to data breaches, service disruption, or further lateral movement within the network. Airsonic-Advanced is a media streaming server software, often used by organizations for managing and streaming audio content, which may be deployed in corporate, educational, or media environments.
Potential Impact
For European organizations using Airsonic-Advanced, this vulnerability poses a significant risk. An attacker exploiting this flaw could upload malicious files to internal or public-facing servers, leading to unauthorized access, data leakage, or service disruption. Given the media-centric nature of Airsonic-Advanced, organizations relying on it for content distribution or internal media management could face operational interruptions. Confidentiality could be compromised if sensitive media or user data is accessed or exfiltrated. Integrity and availability impacts are also possible if attackers replace or delete files or deploy ransomware or other destructive payloads. The medium CVSS score reflects that while the vulnerability is serious, it may require some level of network access to the vulnerable service, which might be restricted in some environments. However, the lack of authentication and user interaction requirements increases the risk, especially for organizations exposing Airsonic-Advanced servers to the internet or untrusted networks. European entities in sectors such as media, education, and small to medium enterprises using this software should prioritize assessment and mitigation to prevent potential exploitation.
Mitigation Recommendations
Organizations should immediately audit their Airsonic-Advanced deployments to identify affected versions (10.0 through 10.6.0). Until an official patch is released, practical mitigations include restricting network access to the Airsonic-Advanced server by implementing firewall rules that limit inbound connections to trusted IP addresses or internal networks only. Disabling or restricting the Playlist Upload Handler functionality, if configurable, can reduce the attack surface. Monitoring logs for unusual upload activity or unexpected file types can help detect exploitation attempts. Employing web application firewalls (WAFs) with rules to block suspicious file uploads or malformed requests targeting the upload endpoint is recommended. Organizations should also prepare to apply patches promptly once available and consider isolating the Airsonic-Advanced server in a segmented network zone to limit potential lateral movement. Regular backups of media content and configuration data should be maintained to enable recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-18T05:34:44.815Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cc0b2216bc0da717cded50
Added to database: 9/18/2025, 1:37:38 PM
Last enriched: 9/18/2025, 1:38:22 PM
Last updated: 9/18/2025, 3:34:54 PM
Views: 5
Related Threats
CVE-2025-10687: SQL Injection in SourceCodester Responsive E-Learning System
MediumCVE-2025-10676: Improper Authorization in fuyang_lipengjun platform
MediumCVE-2025-10675: Improper Authorization in fuyang_lipengjun platform
MediumCVE-2025-10674: Improper Authorization in fuyang_lipengjun platform
MediumCVE-2025-55912: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.