Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62382: CWE-73: External Control of File Name or Path in blakeblackshear frigate

0
High
VulnerabilityCVE-2025-62382cvecve-2025-62382cwe-73
Published: Wed Oct 15 2025 (10/15/2025, 17:07:56 UTC)
Source: CVE Database V5
Vendor/Project: blakeblackshear
Product: frigate

Description

Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.2, Frigate's export workflow allows an authenticated operator to nominate any filesystem location as the thumbnail source for a video export. Because that path is copied verbatim into the publicly served clips directory, the feature can be abused to read arbitrary files that reside on the host running Frigate. In practice, a low-privilege user with API access can pivot from viewing camera footage to exfiltrating sensitive configuration files, secrets, or user data from the appliance itself. This behavior violates the principle of least privilege for the export subsystem and turns a convenience feature into a direct information disclosure vector, with exploitation hinging on a short race window while the background exporter copies the chosen file into place before cleanup runs. This vulnerability is fixed in 0.16.2.

AI-Powered Analysis

AILast updated: 10/15/2025, 17:39:49 UTC

Technical Analysis

CVE-2025-62382 is an external control of file name or path vulnerability (CWE-73) affecting Frigate, a network video recorder software that performs real-time local object detection for IP cameras. In versions prior to 0.16.2, the export workflow allows an authenticated operator to nominate any filesystem location as the thumbnail source for a video export. The nominated path is copied verbatim into the publicly served clips directory, which is accessible over the network. This behavior allows a low-privilege user with API access to exploit a race condition during the background exporter's file copying process to read arbitrary files on the host system. The attacker can thus exfiltrate sensitive data such as configuration files, secrets, or user data stored on the appliance. The vulnerability violates the principle of least privilege by allowing the export subsystem to access arbitrary filesystem locations based on user input. Exploitation does not require user interaction but does require authentication and API access. The vulnerability is fixed in Frigate version 0.16.2. The CVSS v3.1 score is 7.7 (high severity), reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and high confidentiality impact with no integrity or availability impact. No known exploits are currently reported in the wild.

Potential Impact

For European organizations deploying Frigate as part of their IP camera surveillance infrastructure, this vulnerability poses a significant confidentiality risk. Attackers with low-privilege API access can leverage this flaw to read arbitrary files on the host system, potentially exposing sensitive configuration details, authentication secrets, or personal data. This could lead to further compromise of the surveillance system or lateral movement within the network. Given the critical nature of video surveillance in sectors such as government, critical infrastructure, transportation, and corporate security, unauthorized data disclosure could undermine operational security and privacy compliance obligations under regulations like GDPR. Although the vulnerability does not affect system integrity or availability directly, the exposure of sensitive data can facilitate more severe attacks. The requirement for authentication limits exposure to insiders or compromised accounts, but the ease of exploitation and the potential value of the data make this a high-risk issue for affected deployments.

Mitigation Recommendations

European organizations should immediately upgrade all Frigate installations to version 0.16.2 or later, where this vulnerability is fixed. Until upgrades can be applied, restrict API access strictly to trusted and authenticated users, employing strong authentication mechanisms and network segmentation to limit exposure. Implement monitoring and alerting on unusual API export requests or file access patterns that could indicate exploitation attempts. Review and harden filesystem permissions on the host to minimize sensitive file exposure. Consider deploying Web Application Firewalls (WAFs) or API gateways that can detect and block suspicious path traversal or file access attempts. Conduct regular audits of Frigate configurations and logs to detect unauthorized activity. Finally, educate operators about the risks of exporting video thumbnails and enforce the principle of least privilege in user roles and permissions within the Frigate system.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-10T14:22:48.205Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efd906d4cab3a28826793d

Added to database: 10/15/2025, 5:25:26 PM

Last enriched: 10/15/2025, 5:39:49 PM

Last updated: 10/15/2025, 6:48:35 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats