Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23896: CWE-269: Improper Privilege Management in immich-app immich

0
High
VulnerabilityCVE-2026-23896cvecve-2026-23896cwe-269
Published: Thu Jan 29 2026 (01/29/2026, 17:12:43 UTC)
Source: CVE Database V5
Vendor/Project: immich-app
Product: immich

Description

CVE-2026-23896 is a high-severity privilege escalation vulnerability in immich, a self-hosted photo and video management application. Versions prior to 2. 5. 0 allow low-privilege API keys to escalate their permissions by exploiting the update endpoint, granting themselves full administrative access. This flaw arises from improper privilege management (CWE-269). The vulnerability has a CVSS score of 7. 2, reflecting its high impact on confidentiality, integrity, and availability, and ease of network exploitation without user interaction. Although no known exploits are currently reported in the wild, affected systems remain at risk until patched. European organizations using immich versions before 2. 5.

AI-Powered Analysis

AILast updated: 01/29/2026, 17:42:06 UTC

Technical Analysis

CVE-2026-23896 is a vulnerability in immich, a high-performance, self-hosted photo and video management solution. The flaw exists in versions prior to 2.5.0, where API keys with limited privileges can exploit the update endpoint to escalate their own permissions to full administrative rights. This is due to improper privilege management (CWE-269), where the system fails to adequately verify or restrict permission changes initiated via the API. The vulnerability allows an attacker with a low-privilege API key to gain complete control over the immich instance, potentially accessing, modifying, or deleting all stored media and configuration data. The CVSS 3.1 base score of 7.2 indicates a high-severity issue, with network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been observed, the vulnerability poses a significant risk to any deployment of immich prior to version 2.5.0, especially in environments where API keys are distributed or exposed. The fix was introduced in version 2.5.0, which properly restricts permission escalation via the update endpoint. Organizations relying on immich should urgently upgrade and review API key management policies to mitigate potential exploitation.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized full administrative access to immich instances, resulting in exposure or loss of sensitive photo and video data. Given the nature of immich as a media management platform, confidentiality breaches could violate GDPR and other data protection laws, leading to regulatory penalties and reputational damage. Integrity and availability impacts include unauthorized modification or deletion of media assets and disruption of service availability, which could affect business continuity. Organizations using immich in sectors such as media, healthcare, education, or government may face heightened risks due to the sensitive nature of stored data. The ease of exploitation over the network without user interaction increases the threat level, especially if API keys are leaked or insufficiently protected. The lack of known exploits in the wild suggests a window of opportunity for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Immediately upgrade all immich installations to version 2.5.0 or later, where the privilege escalation vulnerability is fixed. 2. Audit all API keys currently in use, revoke any that are unnecessary or have excessive privileges, and rotate keys regularly. 3. Implement strict access controls and monitoring on API key usage to detect anomalous permission changes or suspicious activity. 4. Restrict network access to immich API endpoints to trusted IP ranges or VPNs to reduce exposure. 5. Employ logging and alerting mechanisms to track administrative actions and potential privilege escalation attempts. 6. Educate administrators and developers about secure API key management and the risks of privilege escalation. 7. Consider additional application-layer protections such as Web Application Firewalls (WAFs) to detect and block unauthorized API calls. 8. Regularly review and test immich deployments for security compliance and apply security patches promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-16T21:02:02.903Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697b9895ac06320222a54d53

Added to database: 1/29/2026, 5:27:49 PM

Last enriched: 1/29/2026, 5:42:06 PM

Last updated: 1/29/2026, 6:30:25 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats