CVE-2025-25205

8.2 HIGH

📋 TL;DR

A vulnerability in Audiobookshelf versions 2.17.0 through 2.19.0 allows unauthenticated attackers to bypass authentication by crafting URLs with specific substrings in query parameters. This can lead to unauthorized access to protected data or server crashes. All self-hosted Audiobookshelf instances running affected versions are vulnerable.

💻 Affected Systems

Products:
  • Audiobookshelf
Versions: 2.17.0 through 2.19.0
Operating Systems: All platforms running Audiobookshelf
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The vulnerability exists in the authentication middleware regex pattern matching.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server crash leading to denial of service, plus unauthorized access to all protected audiobook and podcast data.

🟠

Likely Case

Unauthorized access to some protected media files and metadata, potentially causing data leakage.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, but authentication bypass still possible.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly exploitable by any attacker without authentication.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting specific URL patterns but does not require authentication or special privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.19.1

Vendor Advisory: https://github.com/advplyr/audiobookshelf/security/advisories/GHSA-pg8v-5jcv-wrvw

Restart Required: Yes

Instructions:

1. Stop the Audiobookshelf service. 2. Update to version 2.19.1 using your package manager or manual installation. 3. Restart the Audiobookshelf service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Audiobookshelf instance to trusted IP addresses only.

Use firewall rules to limit access (e.g., iptables, ufw, cloud security groups)

Reverse Proxy Authentication

all

Place Audiobookshelf behind a reverse proxy with additional authentication layer.

Configure nginx/apache with basic auth or other authentication methods

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Audiobookshelf from untrusted networks
  • Deploy a web application firewall (WAF) with rules to block suspicious URL patterns containing '/api/' in query parameters

🔍 How to Verify

Check if Vulnerable:

Check Audiobookshelf version via web interface or configuration files. Versions 2.17.0 through 2.19.0 are vulnerable.

Check Version:

Check web interface settings or examine package.json/version files in installation directory

Verify Fix Applied:

After updating, confirm version is 2.19.1 or later. Test authentication by attempting to access protected endpoints without credentials.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /api/ endpoints from unauthenticated users
  • Server crash logs following requests with query parameters containing '/api/' patterns

Network Indicators:

  • HTTP requests with query parameters containing '/api/' substrings from unauthenticated sources

SIEM Query:

source="audiobookshelf" AND (url="*?r=*/api/*" OR status=500) AND user="anonymous"

🔗 References

📤 Share & Export