Cyber Posture

CVE-2025-58760

HighPublic PoC

Published: 09 September 2025

Published
09 September 2025
Modified
18 September 2025
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0013 31.9th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-58760 is a high-severity Relative Path Traversal (CWE-23) vulnerability in Tautulli Tautulli. Its CVSS base score is 8.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 31.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AU-13 (Monitoring for Information Disclosure).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of inputs to the /image API endpoint to block path traversal payloads that enable arbitrary file reads from the server filesystem.

prevent

Limits permitted actions on the unauthenticated /image endpoint to only serving static images from the intended data directory, preventing access to sensitive files like tautulli.db and config.ini.

detect

Monitors system areas for unauthorized disclosures of sensitive information, such as suspicious /image requests exfiltrating JWT tokens or config files via path traversal.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Path traversal in unauthenticated public web endpoint directly enables remote file read of credential stores (config, DB tokens).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Tautulli is a Python based monitoring and tracking tool for Plex Media Server. The `/image` API endpoint in Tautulli v2.15.3 and earlier is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. In…

more

Tautulli, the `/image` API endpoint is used to serve static images from the application's data directory to users. This endpoint can be accessed without authentication, and its intended purpose is for server background images and icons within the user interface. Attackers can exfiltrate files from the application file system, including the `tautulli.db` SQLite database containing active JWT tokens, as well as the `config.ini` file which contains the hashed admin password, the JWT token secret, and the Plex Media Server token and connection details. If the password is cracked, or if a valid JWT token is present in the database, an unauthenticated attacker can escalate their privileges to obtain administrative control over the application. Version 2.16.0 contains a fix for the issue.

Deeper analysisAI

CVE-2025-58760 is a path traversal vulnerability (CWE-23) in the `/image` API endpoint of Tautulli, a Python-based monitoring and tracking tool for Plex Media Server. Affecting versions 2.15.3 and earlier, the endpoint, which serves static images from the application's data directory without authentication, allows attackers to traverse outside the intended directory and access arbitrary files on the application server's filesystem. The issue carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N), reflecting high confidentiality impact with changed scope.

Unauthenticated remote attackers can exploit this vulnerability by sending crafted requests to the `/image` endpoint, enabling them to read sensitive files such as the `tautulli.db` SQLite database containing active JWT tokens and the `config.ini` file with the hashed admin password, JWT token secret, Plex Media Server token, and connection details. Successful exfiltration of these files could allow privilege escalation to administrative control if the hashed password is cracked or a valid JWT token is reused.

The Tautulli GitHub security advisory (GHSA-8g4r-8f3f-hghp) and the fixing commit (47566128e2e5dde98980d59b7a51b98173bc0b40) confirm that version 2.16.0 resolves the vulnerability by addressing the path traversal in the endpoint. Security practitioners should upgrade to 2.16.0 or later and review access logs for suspicious `/image` requests.

Details

CWE(s)

Affected Products

tautulli
tautulli
≤ 2.16.0

CVEs Like This One

CVE-2026-31831Same product: Tautulli Tautulli
CVE-2025-58761Same product: Tautulli Tautulli
CVE-2025-58762Same product: Tautulli Tautulli
CVE-2026-28505Same product: Tautulli Tautulli
CVE-2026-32275Same product: Tautulli Tautulli
CVE-2024-56340Shared CWE-23
CVE-2025-20059Shared CWE-23
CVE-2025-2056Shared CWE-23
CVE-2026-43533Shared CWE-23
CVE-2025-27610Shared CWE-23

References