CVE-2025-60427: n/a
LibreTime 3.0.0-alpha.10 and possibly earlier is vulnerable to Broken Access Control, where a user with the DJ role can access analytics data via the Web UI and direct API calls. The backend does not verify role-based permissions for analytics endpoints, allowing unauthorized retrieval of station-wide metrics. This results in information disclosure to less privileged users.
AI Analysis
Technical Summary
CVE-2025-60427 identifies a Broken Access Control vulnerability in LibreTime version 3.0.0-alpha.10 and potentially earlier releases. LibreTime is an open-source radio automation and broadcast management system. The vulnerability arises because the backend does not properly verify role-based permissions on analytics endpoints. Specifically, users assigned the DJ role, which is typically a less privileged user role, can access station-wide analytics data through the Web UI and direct API calls. This unauthorized access occurs because the backend fails to enforce access control checks, allowing these users to retrieve sensitive metrics that should be restricted to higher privileged roles such as administrators or station managers. The vulnerability is classified under CWE-284 (Improper Access Control). According to the CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N), the attack can be performed remotely over the network with low attack complexity, requires privileges equivalent to the DJ role, and does not require user interaction. The impact is high on confidentiality due to unauthorized disclosure of analytics data, but there is no impact on integrity or availability. No patches or mitigations have been officially published at the time of disclosure, and no known exploits are reported in the wild. This vulnerability could allow an insider or compromised DJ account to gather sensitive operational data, potentially aiding further attacks or competitive intelligence gathering.
Potential Impact
For European organizations, especially those operating radio stations, streaming services, or media outlets using LibreTime, this vulnerability poses a risk of sensitive analytics data exposure. Such data might include listener statistics, broadcast schedules, or other operational metrics that could be leveraged for competitive advantage or to inform targeted attacks. While the vulnerability does not allow modification or disruption of services, unauthorized access to confidential analytics could undermine trust and violate data protection policies. Given the medium severity and requirement for a DJ role account, the threat is more relevant to insider threat scenarios or compromised user credentials. Organizations in Europe with open-source broadcast automation deployments should consider the risk of information leakage and potential regulatory implications under GDPR if personal or sensitive data is indirectly exposed through analytics. The lack of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.
Mitigation Recommendations
1. Immediately audit and restrict the assignment of the DJ role to only trusted users, minimizing the number of accounts with this privilege. 2. Implement network segmentation and access controls to limit API and Web UI access to trusted networks and users. 3. Monitor and log access to analytics endpoints to detect unusual or unauthorized queries by DJ role users. 4. If possible, apply custom access control patches or configuration changes to enforce role-based permissions on analytics endpoints until an official patch is released. 5. Educate users with DJ roles about the sensitivity of analytics data and enforce strong authentication mechanisms to reduce the risk of account compromise. 6. Follow LibreTime project updates closely and apply official security patches promptly once available. 7. Consider deploying Web Application Firewalls (WAF) or API gateways that can enforce additional access controls as an interim protective measure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-60427: n/a
Description
LibreTime 3.0.0-alpha.10 and possibly earlier is vulnerable to Broken Access Control, where a user with the DJ role can access analytics data via the Web UI and direct API calls. The backend does not verify role-based permissions for analytics endpoints, allowing unauthorized retrieval of station-wide metrics. This results in information disclosure to less privileged users.
AI-Powered Analysis
Technical Analysis
CVE-2025-60427 identifies a Broken Access Control vulnerability in LibreTime version 3.0.0-alpha.10 and potentially earlier releases. LibreTime is an open-source radio automation and broadcast management system. The vulnerability arises because the backend does not properly verify role-based permissions on analytics endpoints. Specifically, users assigned the DJ role, which is typically a less privileged user role, can access station-wide analytics data through the Web UI and direct API calls. This unauthorized access occurs because the backend fails to enforce access control checks, allowing these users to retrieve sensitive metrics that should be restricted to higher privileged roles such as administrators or station managers. The vulnerability is classified under CWE-284 (Improper Access Control). According to the CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N), the attack can be performed remotely over the network with low attack complexity, requires privileges equivalent to the DJ role, and does not require user interaction. The impact is high on confidentiality due to unauthorized disclosure of analytics data, but there is no impact on integrity or availability. No patches or mitigations have been officially published at the time of disclosure, and no known exploits are reported in the wild. This vulnerability could allow an insider or compromised DJ account to gather sensitive operational data, potentially aiding further attacks or competitive intelligence gathering.
Potential Impact
For European organizations, especially those operating radio stations, streaming services, or media outlets using LibreTime, this vulnerability poses a risk of sensitive analytics data exposure. Such data might include listener statistics, broadcast schedules, or other operational metrics that could be leveraged for competitive advantage or to inform targeted attacks. While the vulnerability does not allow modification or disruption of services, unauthorized access to confidential analytics could undermine trust and violate data protection policies. Given the medium severity and requirement for a DJ role account, the threat is more relevant to insider threat scenarios or compromised user credentials. Organizations in Europe with open-source broadcast automation deployments should consider the risk of information leakage and potential regulatory implications under GDPR if personal or sensitive data is indirectly exposed through analytics. The lack of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.
Mitigation Recommendations
1. Immediately audit and restrict the assignment of the DJ role to only trusted users, minimizing the number of accounts with this privilege. 2. Implement network segmentation and access controls to limit API and Web UI access to trusted networks and users. 3. Monitor and log access to analytics endpoints to detect unusual or unauthorized queries by DJ role users. 4. If possible, apply custom access control patches or configuration changes to enforce role-based permissions on analytics endpoints until an official patch is released. 5. Educate users with DJ roles about the sensitivity of analytics data and enforce strong authentication mechanisms to reduce the risk of account compromise. 6. Follow LibreTime project updates closely and apply official security patches promptly once available. 7. Consider deploying Web Application Firewalls (WAF) or API gateways that can enforce additional access controls as an interim protective measure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f7c43cdde5d1d51b4c0d2f
Added to database: 10/21/2025, 5:34:52 PM
Last enriched: 10/28/2025, 10:02:25 PM
Last updated: 12/3/2025, 7:58:46 AM
Views: 150
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13486: CWE-94 Improper Control of Generation of Code ('Code Injection') in hwk-fr Advanced Custom Fields: Extended
CriticalCVE-2025-12954: CWE-639 Authorization Bypass Through User-Controlled Key in Timetable and Event Schedule by MotoPress
UnknownCVE-2025-13495: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wpmanageninja FluentCart A New Era of eCommerce – Faster, Lighter, and Simpler
MediumCVE-2025-12585: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in mxchat MxChat – AI Chatbot for WordPress
MediumCVE-2025-10304: CWE-862 Missing Authorization in everestthemes Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.