Skip to main content

CVE-2025-57800: CWE-523: Unprotected Transport of Credentials in advplyr audiobookshelf

High
VulnerabilityCVE-2025-57800cvecve-2025-57800cwe-523cwe-598cwe-601
Published: Fri Aug 22 2025 (08/22/2025, 17:02:04 UTC)
Source: CVE Database V5
Vendor/Project: advplyr
Product: audiobookshelf

Description

Audiobookshelf is an open-source self-hosted audiobook server. In versions 2.6.0 through 2.26.3, the application does not properly restrict redirect callback URLs during OIDC authentication. An attacker can craft a login link that causes Audiobookshelf to store an arbitrary callback in a cookie, which is later used to redirect the user after authentication. The server then issues a 302 redirect to the attacker-controlled URL, appending sensitive OIDC tokens as query parameters. This allows an attacker to obtain the victim's tokens and perform full account takeover, including creating persistent admin users if the victim is an administrator. Tokens are further leaked via browser history, Referer headers, and server logs. This vulnerability impacts all Audiobookshelf deployments using OIDC; no IdP misconfiguration is required. The issue is fixed in version 2.28.0. No known workarounds exist.

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-20T14:30:35.009Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a8a63bad5a09ad0020a08b

Added to database: 8/22/2025, 5:17:47 PM

Last updated: 8/22/2025, 5:17:47 PM

Views: 1

Actions

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats