CVE-2025-62382: CWE-73: External Control of File Name or Path in blakeblackshear frigate
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.2, Frigate's export workflow allows an authenticated operator to nominate any filesystem location as the thumbnail source for a video export. Because that path is copied verbatim into the publicly served clips directory, the feature can be abused to read arbitrary files that reside on the host running Frigate. In practice, a low-privilege user with API access can pivot from viewing camera footage to exfiltrating sensitive configuration files, secrets, or user data from the appliance itself. This behavior violates the principle of least privilege for the export subsystem and turns a convenience feature into a direct information disclosure vector, with exploitation hinging on a short race window while the background exporter copies the chosen file into place before cleanup runs. This vulnerability is fixed in 0.16.2.
AI Analysis
Technical Summary
CVE-2025-62382 is an external control of file name or path vulnerability (CWE-73) affecting Frigate, a network video recorder software that performs real-time local object detection for IP cameras. In versions prior to 0.16.2, the export workflow allows an authenticated operator to nominate any filesystem location as the thumbnail source for a video export. The nominated path is copied verbatim into the publicly served clips directory, which is accessible over the network. This behavior allows a low-privilege user with API access to exploit a race condition during the background exporter's file copying process to read arbitrary files on the host system. The attacker can thus exfiltrate sensitive data such as configuration files, secrets, or user data stored on the appliance. The vulnerability violates the principle of least privilege by allowing the export subsystem to access arbitrary filesystem locations based on user input. Exploitation does not require user interaction but does require authentication and API access. The vulnerability is fixed in Frigate version 0.16.2. The CVSS v3.1 score is 7.7 (high severity), reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and high confidentiality impact with no integrity or availability impact. No known exploits are currently reported in the wild.
Potential Impact
For European organizations deploying Frigate as part of their IP camera surveillance infrastructure, this vulnerability poses a significant confidentiality risk. Attackers with low-privilege API access can leverage this flaw to read arbitrary files on the host system, potentially exposing sensitive configuration details, authentication secrets, or personal data. This could lead to further compromise of the surveillance system or lateral movement within the network. Given the critical nature of video surveillance in sectors such as government, critical infrastructure, transportation, and corporate security, unauthorized data disclosure could undermine operational security and privacy compliance obligations under regulations like GDPR. Although the vulnerability does not affect system integrity or availability directly, the exposure of sensitive data can facilitate more severe attacks. The requirement for authentication limits exposure to insiders or compromised accounts, but the ease of exploitation and the potential value of the data make this a high-risk issue for affected deployments.
Mitigation Recommendations
European organizations should immediately upgrade all Frigate installations to version 0.16.2 or later, where this vulnerability is fixed. Until upgrades can be applied, restrict API access strictly to trusted and authenticated users, employing strong authentication mechanisms and network segmentation to limit exposure. Implement monitoring and alerting on unusual API export requests or file access patterns that could indicate exploitation attempts. Review and harden filesystem permissions on the host to minimize sensitive file exposure. Consider deploying Web Application Firewalls (WAFs) or API gateways that can detect and block suspicious path traversal or file access attempts. Conduct regular audits of Frigate configurations and logs to detect unauthorized activity. Finally, educate operators about the risks of exporting video thumbnails and enforce the principle of least privilege in user roles and permissions within the Frigate system.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-62382: CWE-73: External Control of File Name or Path in blakeblackshear frigate
Description
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.2, Frigate's export workflow allows an authenticated operator to nominate any filesystem location as the thumbnail source for a video export. Because that path is copied verbatim into the publicly served clips directory, the feature can be abused to read arbitrary files that reside on the host running Frigate. In practice, a low-privilege user with API access can pivot from viewing camera footage to exfiltrating sensitive configuration files, secrets, or user data from the appliance itself. This behavior violates the principle of least privilege for the export subsystem and turns a convenience feature into a direct information disclosure vector, with exploitation hinging on a short race window while the background exporter copies the chosen file into place before cleanup runs. This vulnerability is fixed in 0.16.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-62382 is an external control of file name or path vulnerability (CWE-73) affecting Frigate, a network video recorder software that performs real-time local object detection for IP cameras. In versions prior to 0.16.2, the export workflow allows an authenticated operator to nominate any filesystem location as the thumbnail source for a video export. The nominated path is copied verbatim into the publicly served clips directory, which is accessible over the network. This behavior allows a low-privilege user with API access to exploit a race condition during the background exporter's file copying process to read arbitrary files on the host system. The attacker can thus exfiltrate sensitive data such as configuration files, secrets, or user data stored on the appliance. The vulnerability violates the principle of least privilege by allowing the export subsystem to access arbitrary filesystem locations based on user input. Exploitation does not require user interaction but does require authentication and API access. The vulnerability is fixed in Frigate version 0.16.2. The CVSS v3.1 score is 7.7 (high severity), reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and high confidentiality impact with no integrity or availability impact. No known exploits are currently reported in the wild.
Potential Impact
For European organizations deploying Frigate as part of their IP camera surveillance infrastructure, this vulnerability poses a significant confidentiality risk. Attackers with low-privilege API access can leverage this flaw to read arbitrary files on the host system, potentially exposing sensitive configuration details, authentication secrets, or personal data. This could lead to further compromise of the surveillance system or lateral movement within the network. Given the critical nature of video surveillance in sectors such as government, critical infrastructure, transportation, and corporate security, unauthorized data disclosure could undermine operational security and privacy compliance obligations under regulations like GDPR. Although the vulnerability does not affect system integrity or availability directly, the exposure of sensitive data can facilitate more severe attacks. The requirement for authentication limits exposure to insiders or compromised accounts, but the ease of exploitation and the potential value of the data make this a high-risk issue for affected deployments.
Mitigation Recommendations
European organizations should immediately upgrade all Frigate installations to version 0.16.2 or later, where this vulnerability is fixed. Until upgrades can be applied, restrict API access strictly to trusted and authenticated users, employing strong authentication mechanisms and network segmentation to limit exposure. Implement monitoring and alerting on unusual API export requests or file access patterns that could indicate exploitation attempts. Review and harden filesystem permissions on the host to minimize sensitive file exposure. Consider deploying Web Application Firewalls (WAFs) or API gateways that can detect and block suspicious path traversal or file access attempts. Conduct regular audits of Frigate configurations and logs to detect unauthorized activity. Finally, educate operators about the risks of exporting video thumbnails and enforce the principle of least privilege in user roles and permissions within the Frigate system.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-10T14:22:48.205Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efd906d4cab3a28826793d
Added to database: 10/15/2025, 5:25:26 PM
Last enriched: 10/15/2025, 5:39:49 PM
Last updated: 10/15/2025, 6:48:35 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
F5 Confirms Nation-State Breach, Source Code and Vulnerability Data Stolen
HighCVE-2024-6592: CWE-306 Missing Authentication for Critical Function in WatchGuard Authentication Gateway
CriticalCVE-2025-62410: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in capricorn86 happy-dom
CriticalCVE-2025-62371: CWE-295: Improper Certificate Validation in opensearch-project data-prepper
HighCVE-2025-62381: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in ciscoheat sveltekit-superforms
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.