Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13131: Incorrect Default Permissions in Sonarr

0
High
VulnerabilityCVE-2025-13131cvecve-2025-13131
Published: Thu Nov 13 2025 (11/13/2025, 22:02:07 UTC)
Source: CVE Database V5
Product: Sonarr

Description

A vulnerability was found in Sonarr 4.0.15.2940. The impacted element is an unknown function of the file C:\ProgramData\Sonarr\bin\Sonarr.Console.exe of the component Service. Performing manipulation results in incorrect default permissions. The attack is only possible with local access. The vendor confirms this vulnerability but classifies it as a "low severity issue due to the default service user being used as it would either require someone to intentionally change the service to a highly privileged account or an attacker would need an admin level account". It is planned to fix this issue in the next major release v5.

AI-Powered Analysis

AILast updated: 11/13/2025, 22:20:19 UTC

Technical Analysis

CVE-2025-13131 identifies a permissions misconfiguration vulnerability in Sonarr 4.0.15.2940, specifically affecting the file Sonarr.Console.exe located in C:\ProgramData\Sonarr\bin\. The issue arises from incorrect default access control lists (ACLs) assigned to this executable, which is part of the Sonarr service component. This misconfiguration allows users with local access and low privileges to manipulate the service executable, potentially leading to privilege escalation or unauthorized service manipulation. The vulnerability does not require user interaction or authentication beyond local access, but to fully exploit it, an attacker would need to either change the service to run under a highly privileged account or already possess administrative rights. The vendor classifies the issue as low severity due to these constraints, but the CVSS 4.0 score of 8.5 (high) reflects the potential impact on confidentiality, integrity, and availability if exploited. The vulnerability has no known exploits in the wild as of now and is scheduled to be addressed in the next major release (v5). This vulnerability highlights the risk of improper default permissions on service executables, which can be a vector for local privilege escalation attacks in Windows environments.

Potential Impact

For European organizations, the impact of CVE-2025-13131 primarily concerns environments where Sonarr is deployed for media management and where local user access controls are insufficiently restrictive. If exploited, an attacker with local access could manipulate the Sonarr service executable, potentially leading to privilege escalation or unauthorized service control. This could result in unauthorized access to media libraries, disruption of service availability, or use of the compromised system as a foothold for further lateral movement within the network. While the attack requires local access and some level of privilege, environments with shared workstations, weak endpoint security, or insider threats are particularly vulnerable. The impact on confidentiality, integrity, and availability is high if the vulnerability is exploited, as indicated by the CVSS score. European organizations with strict regulatory requirements around data protection and service availability should consider this a significant risk, especially in sectors where media servers are integrated with broader IT infrastructure.

Mitigation Recommendations

To mitigate CVE-2025-13131, organizations should immediately audit and restrict the file system permissions on C:\ProgramData\Sonarr\bin\Sonarr.Console.exe to ensure that only authorized service accounts and administrators have write or modify access. Avoid running the Sonarr service under highly privileged accounts; maintain the default low-privilege service user. Implement strict local user access controls to prevent unauthorized local access. Employ endpoint detection and response (EDR) solutions to monitor for suspicious modifications to service executables. Regularly update Sonarr to the latest versions and plan to upgrade to Sonarr v5 once released, as it will include a fix for this vulnerability. Additionally, conduct user privilege reviews and enforce the principle of least privilege to minimize the risk of privilege escalation. Network segmentation can also limit the impact of a compromised local account. Finally, educate users about the risks of local privilege misuse and monitor logs for unusual service behavior.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-13T15:28:43.342Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69165800ef0b598b9f6fad7b

Added to database: 11/13/2025, 10:13:20 PM

Last enriched: 11/13/2025, 10:20:19 PM

Last updated: 11/14/2025, 4:07:09 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats