CVE-2026-23896: CWE-269: Improper Privilege Management in immich-app immich
immich is a high performance self-hosted photo and video management solution. Prior to version 2.5.0, API keys can escalate their own permissions by calling the update endpoint, allowing a low-privilege API key to grant itself full administrative access to the system. Version 2.5.0 fixes the issue.
AI Analysis
Technical Summary
CVE-2026-23896 is a vulnerability in immich, a high-performance, self-hosted photo and video management solution. The flaw exists in versions prior to 2.5.0, where API keys with limited privileges can exploit the update endpoint to escalate their own permissions to full administrative rights. This is due to improper privilege management (CWE-269), where the system fails to adequately verify or restrict permission changes initiated via the API. The vulnerability allows an attacker with a low-privilege API key to gain complete control over the immich instance, potentially accessing, modifying, or deleting all stored media and configuration data. The CVSS 3.1 base score of 7.2 indicates a high-severity issue, with network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been observed, the vulnerability poses a significant risk to any deployment of immich prior to version 2.5.0, especially in environments where API keys are distributed or exposed. The fix was introduced in version 2.5.0, which properly restricts permission escalation via the update endpoint. Organizations relying on immich should urgently upgrade and review API key management policies to mitigate potential exploitation.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized full administrative access to immich instances, resulting in exposure or loss of sensitive photo and video data. Given the nature of immich as a media management platform, confidentiality breaches could violate GDPR and other data protection laws, leading to regulatory penalties and reputational damage. Integrity and availability impacts include unauthorized modification or deletion of media assets and disruption of service availability, which could affect business continuity. Organizations using immich in sectors such as media, healthcare, education, or government may face heightened risks due to the sensitive nature of stored data. The ease of exploitation over the network without user interaction increases the threat level, especially if API keys are leaked or insufficiently protected. The lack of known exploits in the wild suggests a window of opportunity for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
1. Immediately upgrade all immich installations to version 2.5.0 or later, where the privilege escalation vulnerability is fixed. 2. Audit all API keys currently in use, revoke any that are unnecessary or have excessive privileges, and rotate keys regularly. 3. Implement strict access controls and monitoring on API key usage to detect anomalous permission changes or suspicious activity. 4. Restrict network access to immich API endpoints to trusted IP ranges or VPNs to reduce exposure. 5. Employ logging and alerting mechanisms to track administrative actions and potential privilege escalation attempts. 6. Educate administrators and developers about secure API key management and the risks of privilege escalation. 7. Consider additional application-layer protections such as Web Application Firewalls (WAFs) to detect and block unauthorized API calls. 8. Regularly review and test immich deployments for security compliance and apply security patches promptly.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Belgium, Italy
CVE-2026-23896: CWE-269: Improper Privilege Management in immich-app immich
Description
immich is a high performance self-hosted photo and video management solution. Prior to version 2.5.0, API keys can escalate their own permissions by calling the update endpoint, allowing a low-privilege API key to grant itself full administrative access to the system. Version 2.5.0 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2026-23896 is a vulnerability in immich, a high-performance, self-hosted photo and video management solution. The flaw exists in versions prior to 2.5.0, where API keys with limited privileges can exploit the update endpoint to escalate their own permissions to full administrative rights. This is due to improper privilege management (CWE-269), where the system fails to adequately verify or restrict permission changes initiated via the API. The vulnerability allows an attacker with a low-privilege API key to gain complete control over the immich instance, potentially accessing, modifying, or deleting all stored media and configuration data. The CVSS 3.1 base score of 7.2 indicates a high-severity issue, with network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been observed, the vulnerability poses a significant risk to any deployment of immich prior to version 2.5.0, especially in environments where API keys are distributed or exposed. The fix was introduced in version 2.5.0, which properly restricts permission escalation via the update endpoint. Organizations relying on immich should urgently upgrade and review API key management policies to mitigate potential exploitation.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized full administrative access to immich instances, resulting in exposure or loss of sensitive photo and video data. Given the nature of immich as a media management platform, confidentiality breaches could violate GDPR and other data protection laws, leading to regulatory penalties and reputational damage. Integrity and availability impacts include unauthorized modification or deletion of media assets and disruption of service availability, which could affect business continuity. Organizations using immich in sectors such as media, healthcare, education, or government may face heightened risks due to the sensitive nature of stored data. The ease of exploitation over the network without user interaction increases the threat level, especially if API keys are leaked or insufficiently protected. The lack of known exploits in the wild suggests a window of opportunity for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
1. Immediately upgrade all immich installations to version 2.5.0 or later, where the privilege escalation vulnerability is fixed. 2. Audit all API keys currently in use, revoke any that are unnecessary or have excessive privileges, and rotate keys regularly. 3. Implement strict access controls and monitoring on API key usage to detect anomalous permission changes or suspicious activity. 4. Restrict network access to immich API endpoints to trusted IP ranges or VPNs to reduce exposure. 5. Employ logging and alerting mechanisms to track administrative actions and potential privilege escalation attempts. 6. Educate administrators and developers about secure API key management and the risks of privilege escalation. 7. Consider additional application-layer protections such as Web Application Firewalls (WAFs) to detect and block unauthorized API calls. 8. Regularly review and test immich deployments for security compliance and apply security patches promptly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-16T21:02:02.903Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697b9895ac06320222a54d53
Added to database: 1/29/2026, 5:27:49 PM
Last enriched: 1/29/2026, 5:42:06 PM
Last updated: 2/7/2026, 11:37:09 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.