Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60427: n/a

0
Medium
VulnerabilityCVE-2025-60427cvecve-2025-60427
Published: Tue Oct 21 2025 (10/21/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

LibreTime 3.0.0-alpha.10 and possibly earlier is vulnerable to Broken Access Control, where a user with the DJ role can access analytics data via the Web UI and direct API calls. The backend does not verify role-based permissions for analytics endpoints, allowing unauthorized retrieval of station-wide metrics. This results in information disclosure to less privileged users.

AI-Powered Analysis

AILast updated: 10/28/2025, 22:02:25 UTC

Technical Analysis

CVE-2025-60427 identifies a Broken Access Control vulnerability in LibreTime version 3.0.0-alpha.10 and potentially earlier releases. LibreTime is an open-source radio automation and broadcast management system. The vulnerability arises because the backend does not properly verify role-based permissions on analytics endpoints. Specifically, users assigned the DJ role, which is typically a less privileged user role, can access station-wide analytics data through the Web UI and direct API calls. This unauthorized access occurs because the backend fails to enforce access control checks, allowing these users to retrieve sensitive metrics that should be restricted to higher privileged roles such as administrators or station managers. The vulnerability is classified under CWE-284 (Improper Access Control). According to the CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N), the attack can be performed remotely over the network with low attack complexity, requires privileges equivalent to the DJ role, and does not require user interaction. The impact is high on confidentiality due to unauthorized disclosure of analytics data, but there is no impact on integrity or availability. No patches or mitigations have been officially published at the time of disclosure, and no known exploits are reported in the wild. This vulnerability could allow an insider or compromised DJ account to gather sensitive operational data, potentially aiding further attacks or competitive intelligence gathering.

Potential Impact

For European organizations, especially those operating radio stations, streaming services, or media outlets using LibreTime, this vulnerability poses a risk of sensitive analytics data exposure. Such data might include listener statistics, broadcast schedules, or other operational metrics that could be leveraged for competitive advantage or to inform targeted attacks. While the vulnerability does not allow modification or disruption of services, unauthorized access to confidential analytics could undermine trust and violate data protection policies. Given the medium severity and requirement for a DJ role account, the threat is more relevant to insider threat scenarios or compromised user credentials. Organizations in Europe with open-source broadcast automation deployments should consider the risk of information leakage and potential regulatory implications under GDPR if personal or sensitive data is indirectly exposed through analytics. The lack of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

1. Immediately audit and restrict the assignment of the DJ role to only trusted users, minimizing the number of accounts with this privilege. 2. Implement network segmentation and access controls to limit API and Web UI access to trusted networks and users. 3. Monitor and log access to analytics endpoints to detect unusual or unauthorized queries by DJ role users. 4. If possible, apply custom access control patches or configuration changes to enforce role-based permissions on analytics endpoints until an official patch is released. 5. Educate users with DJ roles about the sensitivity of analytics data and enforce strong authentication mechanisms to reduce the risk of account compromise. 6. Follow LibreTime project updates closely and apply official security patches promptly once available. 7. Consider deploying Web Application Firewalls (WAF) or API gateways that can enforce additional access controls as an interim protective measure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f7c43cdde5d1d51b4c0d2f

Added to database: 10/21/2025, 5:34:52 PM

Last enriched: 10/28/2025, 10:02:25 PM

Last updated: 12/3/2025, 7:58:46 AM

Views: 150

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats