CVE-2026-23896: CWE-269: Improper Privilege Management in immich-app immich
CVE-2026-23896 is a high-severity privilege escalation vulnerability in immich, a self-hosted photo and video management application. Versions prior to 2. 5. 0 allow low-privilege API keys to escalate their permissions by exploiting the update endpoint, granting themselves full administrative access. This flaw arises from improper privilege management (CWE-269). The vulnerability has a CVSS score of 7. 2, reflecting its high impact on confidentiality, integrity, and availability, and ease of network exploitation without user interaction. Although no known exploits are currently reported in the wild, affected systems remain at risk until patched. European organizations using immich versions before 2. 5.
AI Analysis
Technical Summary
CVE-2026-23896 is a vulnerability in immich, a high-performance, self-hosted photo and video management solution. The flaw exists in versions prior to 2.5.0, where API keys with limited privileges can exploit the update endpoint to escalate their own permissions to full administrative rights. This is due to improper privilege management (CWE-269), where the system fails to adequately verify or restrict permission changes initiated via the API. The vulnerability allows an attacker with a low-privilege API key to gain complete control over the immich instance, potentially accessing, modifying, or deleting all stored media and configuration data. The CVSS 3.1 base score of 7.2 indicates a high-severity issue, with network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been observed, the vulnerability poses a significant risk to any deployment of immich prior to version 2.5.0, especially in environments where API keys are distributed or exposed. The fix was introduced in version 2.5.0, which properly restricts permission escalation via the update endpoint. Organizations relying on immich should urgently upgrade and review API key management policies to mitigate potential exploitation.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized full administrative access to immich instances, resulting in exposure or loss of sensitive photo and video data. Given the nature of immich as a media management platform, confidentiality breaches could violate GDPR and other data protection laws, leading to regulatory penalties and reputational damage. Integrity and availability impacts include unauthorized modification or deletion of media assets and disruption of service availability, which could affect business continuity. Organizations using immich in sectors such as media, healthcare, education, or government may face heightened risks due to the sensitive nature of stored data. The ease of exploitation over the network without user interaction increases the threat level, especially if API keys are leaked or insufficiently protected. The lack of known exploits in the wild suggests a window of opportunity for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
1. Immediately upgrade all immich installations to version 2.5.0 or later, where the privilege escalation vulnerability is fixed. 2. Audit all API keys currently in use, revoke any that are unnecessary or have excessive privileges, and rotate keys regularly. 3. Implement strict access controls and monitoring on API key usage to detect anomalous permission changes or suspicious activity. 4. Restrict network access to immich API endpoints to trusted IP ranges or VPNs to reduce exposure. 5. Employ logging and alerting mechanisms to track administrative actions and potential privilege escalation attempts. 6. Educate administrators and developers about secure API key management and the risks of privilege escalation. 7. Consider additional application-layer protections such as Web Application Firewalls (WAFs) to detect and block unauthorized API calls. 8. Regularly review and test immich deployments for security compliance and apply security patches promptly.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Belgium, Italy
CVE-2026-23896: CWE-269: Improper Privilege Management in immich-app immich
Description
CVE-2026-23896 is a high-severity privilege escalation vulnerability in immich, a self-hosted photo and video management application. Versions prior to 2. 5. 0 allow low-privilege API keys to escalate their permissions by exploiting the update endpoint, granting themselves full administrative access. This flaw arises from improper privilege management (CWE-269). The vulnerability has a CVSS score of 7. 2, reflecting its high impact on confidentiality, integrity, and availability, and ease of network exploitation without user interaction. Although no known exploits are currently reported in the wild, affected systems remain at risk until patched. European organizations using immich versions before 2. 5.
AI-Powered Analysis
Technical Analysis
CVE-2026-23896 is a vulnerability in immich, a high-performance, self-hosted photo and video management solution. The flaw exists in versions prior to 2.5.0, where API keys with limited privileges can exploit the update endpoint to escalate their own permissions to full administrative rights. This is due to improper privilege management (CWE-269), where the system fails to adequately verify or restrict permission changes initiated via the API. The vulnerability allows an attacker with a low-privilege API key to gain complete control over the immich instance, potentially accessing, modifying, or deleting all stored media and configuration data. The CVSS 3.1 base score of 7.2 indicates a high-severity issue, with network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been observed, the vulnerability poses a significant risk to any deployment of immich prior to version 2.5.0, especially in environments where API keys are distributed or exposed. The fix was introduced in version 2.5.0, which properly restricts permission escalation via the update endpoint. Organizations relying on immich should urgently upgrade and review API key management policies to mitigate potential exploitation.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized full administrative access to immich instances, resulting in exposure or loss of sensitive photo and video data. Given the nature of immich as a media management platform, confidentiality breaches could violate GDPR and other data protection laws, leading to regulatory penalties and reputational damage. Integrity and availability impacts include unauthorized modification or deletion of media assets and disruption of service availability, which could affect business continuity. Organizations using immich in sectors such as media, healthcare, education, or government may face heightened risks due to the sensitive nature of stored data. The ease of exploitation over the network without user interaction increases the threat level, especially if API keys are leaked or insufficiently protected. The lack of known exploits in the wild suggests a window of opportunity for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
1. Immediately upgrade all immich installations to version 2.5.0 or later, where the privilege escalation vulnerability is fixed. 2. Audit all API keys currently in use, revoke any that are unnecessary or have excessive privileges, and rotate keys regularly. 3. Implement strict access controls and monitoring on API key usage to detect anomalous permission changes or suspicious activity. 4. Restrict network access to immich API endpoints to trusted IP ranges or VPNs to reduce exposure. 5. Employ logging and alerting mechanisms to track administrative actions and potential privilege escalation attempts. 6. Educate administrators and developers about secure API key management and the risks of privilege escalation. 7. Consider additional application-layer protections such as Web Application Firewalls (WAFs) to detect and block unauthorized API calls. 8. Regularly review and test immich deployments for security compliance and apply security patches promptly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-16T21:02:02.903Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697b9895ac06320222a54d53
Added to database: 1/29/2026, 5:27:49 PM
Last enriched: 1/29/2026, 5:42:06 PM
Last updated: 1/29/2026, 6:30:25 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-69749: n/a
UnknownCVE-2025-15548: CWE-311 Missing Encryption of Sensitive Data in TP-Link Systems Inc. VX800v v1.0
MediumCVE-2025-15543: CWE-59 Improper Link Resolution Before File Access ('Link Following') in TP-Link Systems Inc. VX800v v1.0
MediumCVE-2025-15542: CWE-754 Improper Check for Unusual or Exceptional Conditions in TP-Link Systems Inc. VX800v v1.0
MediumCVE-2025-15541: CWE-59 Improper Link Resolution Before File Access ('Link Following') in TP-Link Systems Inc. VX800v v1.0
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.