Skip to main content

CVE-2025-49143: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in nautobot nautobot

Medium
VulnerabilityCVE-2025-49143cvecve-2025-49143cwe-200
Published: Tue Jun 10 2025 (06/10/2025, 15:43:59 UTC)
Source: CVE Database V5
Vendor/Project: nautobot
Product: nautobot

Description

Nautobot is a Network Source of Truth and Network Automation Platform. Prior to v2.4.10 and v1.6.32 , files uploaded by users to Nautobot's MEDIA_ROOT directory, including DeviceType image attachments as well as images attached to a Location, Device, or Rack, are served to users via a URL endpoint that was not enforcing user authentication. As a consequence, such files can be retrieved by anonymous users who know or can guess the correct URL for a given file. Nautobot v2.4.10 and v1.6.32 address this issue by adding enforcement of Nautobot user authentication to this endpoint.

AI-Powered Analysis

AILast updated: 07/10/2025, 19:05:53 UTC

Technical Analysis

CVE-2025-49143 is a medium-severity vulnerability affecting Nautobot, a network source of truth and network automation platform widely used for managing network infrastructure. The vulnerability arises from the way Nautobot handles user-uploaded files stored in its MEDIA_ROOT directory. Specifically, prior to versions 1.6.32 and 2.4.10, files such as DeviceType image attachments and images linked to Locations, Devices, or Racks are served via a URL endpoint that does not enforce user authentication. This means that any anonymous user who can guess or discover the URL of these files can access potentially sensitive images without authorization. The issue is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The vulnerability has a CVSS 4.0 base score of 6.3, reflecting a medium severity level. The attack vector is network-based (AV:N), with high attack complexity (AC:H), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality (VC:L) with no impact on integrity or availability. Nautobot versions 1.6.32 and 2.4.10 have addressed this issue by enforcing user authentication on the affected endpoint, thereby preventing unauthorized access to uploaded files. There are no known exploits in the wild at this time.

Potential Impact

For European organizations using Nautobot, this vulnerability could lead to unauthorized disclosure of sensitive network-related images and documentation. Such information might include device types, rack layouts, or location-specific network diagrams, which could aid an attacker in reconnaissance activities or facilitate further targeted attacks. Although the vulnerability does not allow modification or disruption of data, the exposure of internal network details can compromise operational security and privacy. Organizations in sectors with stringent data protection regulations, such as finance, healthcare, and critical infrastructure, may face compliance risks if sensitive information is leaked. The ease of exploitation is mitigated by the need to guess or discover URLs, but automated scanning tools could facilitate this. The lack of authentication enforcement prior to patching means that any external or internal unauthorized user could potentially access these files, increasing the risk surface.

Mitigation Recommendations

European organizations should immediately upgrade Nautobot installations to versions 1.6.32 or 2.4.10 or later to ensure the authentication enforcement is in place. Until upgrades can be performed, organizations should restrict network access to the MEDIA_ROOT directory endpoint using network segmentation, firewall rules, or reverse proxy authentication layers to prevent anonymous access. Additionally, organizations should audit existing uploaded files for sensitive content and consider removing or re-uploading files with stricter access controls. Implementing monitoring and alerting for unusual access patterns to these endpoints can help detect potential exploitation attempts. Regularly reviewing and updating access control policies for network management platforms is recommended to prevent similar issues. Finally, organizations should educate administrators about the importance of applying security patches promptly and verifying that authentication mechanisms are correctly enforced on all endpoints serving sensitive data.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-02T10:39:41.634Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68487f4f1b0bd07c393898c3

Added to database: 6/10/2025, 6:54:07 PM

Last enriched: 7/10/2025, 7:05:53 PM

Last updated: 8/13/2025, 1:32:37 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats