Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57800: CWE-523: Unprotected Transport of Credentials in advplyr audiobookshelf

0
High
VulnerabilityCVE-2025-57800cvecve-2025-57800cwe-523cwe-598cwe-601
Published: Fri Aug 22 2025 (08/22/2025, 17:02:04 UTC)
Source: CVE Database V5
Vendor/Project: advplyr
Product: audiobookshelf

Description

Audiobookshelf is an open-source self-hosted audiobook server. In versions 2.6.0 through 2.26.3, the application does not properly restrict redirect callback URLs during OIDC authentication. An attacker can craft a login link that causes Audiobookshelf to store an arbitrary callback in a cookie, which is later used to redirect the user after authentication. The server then issues a 302 redirect to the attacker-controlled URL, appending sensitive OIDC tokens as query parameters. This allows an attacker to obtain the victim's tokens and perform full account takeover, including creating persistent admin users if the victim is an administrator. Tokens are further leaked via browser history, Referer headers, and server logs. This vulnerability impacts all Audiobookshelf deployments using OIDC; no IdP misconfiguration is required. The issue is fixed in version 2.28.0. No known workarounds exist.

AI-Powered Analysis

AILast updated: 08/22/2025, 17:32:44 UTC

Technical Analysis

CVE-2025-57800 is a critical vulnerability affecting the open-source self-hosted audiobook server Audiobookshelf, specifically versions 2.6.0 through 2.26.3. The issue arises from improper validation and restriction of redirect callback URLs during OpenID Connect (OIDC) authentication. An attacker can craft a malicious login link that causes the Audiobookshelf server to store an arbitrary callback URL in a cookie. After the victim authenticates, the server issues an HTTP 302 redirect to this attacker-controlled URL, appending sensitive OIDC tokens as query parameters. These tokens include access and ID tokens that grant full access to the victim's account. Because these tokens are exposed in the URL, they can be leaked through browser history, Referer headers, and server logs, significantly increasing the risk of compromise. An attacker who obtains these tokens can perform a full account takeover, including creating persistent administrator accounts if the victim has admin privileges. This vulnerability does not require any misconfiguration on the Identity Provider (IdP) side, making all Audiobookshelf deployments using OIDC authentication vulnerable. The flaw involves multiple CWE categories: CWE-523 (Unprotected Transport of Credentials), CWE-598 (Information Exposure), and CWE-601 (Open Redirect). The vulnerability has a CVSS v3.1 score of 8.8 (high severity), reflecting its network attack vector, low attack complexity, no privileges required, but requiring user interaction (victim must click the malicious link). The issue was publicly disclosed on August 22, 2025, and fixed in version 2.28.0. No known workarounds exist, and no exploits have been observed in the wild yet.

Potential Impact

For European organizations using Audiobookshelf with OIDC authentication, this vulnerability poses a significant risk of account compromise and unauthorized administrative access. Audiobookshelf is often deployed in self-hosted environments, including educational institutions, libraries, and media organizations that manage audiobook collections. A successful exploitation could lead to unauthorized data access, manipulation, or deletion of audiobook content, disruption of service availability, and potential lateral movement within the organization's network if the compromised account has elevated privileges. The exposure of OIDC tokens also risks broader identity compromise if tokens are reused or linked to other services. Given the tokens are leaked via URLs, browser history, and logs, forensic investigation and remediation become more complex. The lack of required IdP misconfiguration means organizations cannot rely on IdP settings to mitigate this risk, increasing the urgency to update Audiobookshelf. The impact extends beyond confidentiality to integrity and availability, as attackers can create persistent admin users, potentially locking out legitimate administrators or injecting malicious content. This could also damage organizational reputation and violate data protection regulations such as GDPR if personal data is accessed or exposed.

Mitigation Recommendations

The primary mitigation is to upgrade Audiobookshelf to version 2.28.0 or later, where the vulnerability is fixed by properly validating and restricting redirect callback URLs during OIDC authentication. Organizations should prioritize this update in their patch management cycles. Until the update is applied, organizations should restrict access to the Audiobookshelf server to trusted networks and users to reduce exposure to malicious login links. Implementing strict Content Security Policies (CSP) and monitoring HTTP logs for unusual redirect patterns or unexpected 302 responses can help detect exploitation attempts. Additionally, organizations should educate users about the risks of clicking unsolicited login links and encourage the use of multi-factor authentication (MFA) where possible to reduce the impact of token theft. Reviewing and rotating OIDC tokens and credentials after patching can help invalidate any stolen tokens. Logging and monitoring should be enhanced to detect suspicious account activities, such as unexpected admin user creation. Finally, organizations should audit their OIDC configurations and ensure that tokens are never exposed in URLs or logs in other integrated systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-20T14:30:35.009Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a8a63bad5a09ad0020a08b

Added to database: 8/22/2025, 5:17:47 PM

Last enriched: 8/22/2025, 5:32:44 PM

Last updated: 10/7/2025, 8:32:32 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats