Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23877: CWE-25: Path Traversal: '/../filedir' in swingmx swingmusic

0
Medium
VulnerabilityCVE-2026-23877cvecve-2026-23877cwe-25cwe-284
Published: Mon Jan 19 2026 (01/19/2026, 20:52:00 UTC)
Source: CVE Database V5
Vendor/Project: swingmx
Product: swingmusic

Description

Swing Music is a self-hosted music player for local audio files. Prior to version 2.1.4, Swing Music's `list_folders()` function in the `/folder/dir-browser` endpoint is vulnerable to directory traversal attacks. Any authenticated user (including non-admin) can browse arbitrary directories on the server filesystem. Version 2.1.4 fixes the issue.

AI-Powered Analysis

AILast updated: 01/19/2026, 21:20:29 UTC

Technical Analysis

CVE-2026-23877 is a directory traversal vulnerability classified under CWE-25 and CWE-284 affecting the Swing Music self-hosted music player software. The vulnerability resides in the list_folders() function exposed via the /folder/dir-browser endpoint. Prior to version 2.1.4, this function does not properly sanitize user input, allowing authenticated users to manipulate the directory path parameter to traverse outside the intended music directories using sequences like '/../'. This enables attackers with valid credentials to access arbitrary directories on the underlying server filesystem. Although the vulnerability requires authentication, it does not require elevated privileges or user interaction beyond login. The exposure primarily risks confidentiality as attackers can read sensitive files outside the application scope but cannot modify or delete files. The CVSS 4.0 base score is 5.3 (medium severity) reflecting network attack vector, low attack complexity, and limited scope impact confined to confidentiality. No known exploits are currently reported in the wild. The issue is resolved in Swing Music version 2.1.4 by implementing proper input validation and path normalization to prevent directory traversal. Organizations running vulnerable versions should upgrade immediately to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive server files if they use Swing Music versions prior to 2.1.4. Confidential information such as configuration files, credentials, or private data stored on the server could be exposed to any authenticated user, including non-admin personnel or potentially compromised accounts. This could facilitate further attacks or data breaches. While the vulnerability does not allow modification or deletion of files, the confidentiality breach alone can have regulatory and reputational consequences, especially under GDPR requirements. Organizations using Swing Music in environments with sensitive data or shared user access are particularly at risk. The impact is limited to confidentiality and requires authentication, reducing the likelihood of widespread exploitation but still necessitating prompt remediation.

Mitigation Recommendations

1. Upgrade all instances of Swing Music to version 2.1.4 or later, which contains the patch for this vulnerability. 2. Restrict access to the Swing Music application to trusted users only and enforce strong authentication mechanisms to reduce risk of compromised accounts. 3. Implement network segmentation and firewall rules to limit access to the server hosting Swing Music, minimizing exposure. 4. Monitor application logs for unusual directory browsing activity indicative of exploitation attempts. 5. Conduct regular audits of server filesystem permissions to ensure sensitive directories are not unnecessarily exposed. 6. If upgrading immediately is not possible, consider disabling or restricting the /folder/dir-browser endpoint temporarily. 7. Educate users about the risks of credential compromise and enforce multi-factor authentication where feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-16T21:02:02.900Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e9cb34623b1157cce9c8e

Added to database: 1/19/2026, 9:05:55 PM

Last enriched: 1/19/2026, 9:20:29 PM

Last updated: 1/20/2026, 8:11:06 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats