CVE-2025-58763

8.0 HIGH

📋 TL;DR

This command injection vulnerability in Tautulli allows attackers with administrative access to execute arbitrary commands on the server, potentially leading to full system compromise. It affects Tautulli installations that were manually cloned from GitHub rather than installed via package managers. The vulnerability is exploitable through the git update functionality.

💻 Affected Systems

Products:
  • Tautulli
Versions: v2.15.3 and prior
Operating Systems: Linux, Windows, macOS
Default Config Vulnerable: ✅ No
Notes: Only affects installations cloned directly from GitHub and installed manually. Package manager installations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root privileges, data exfiltration, installation of persistent backdoors, and lateral movement to other systems.

🟠

Likely Case

Attacker with administrative access executes commands to steal sensitive data, modify configurations, or install cryptocurrency miners.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and monitoring preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative access to Tautulli web interface. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.16.0

Vendor Advisory: https://github.com/Tautulli/Tautulli/security/advisories/GHSA-jrm9-r57q-6cvf

Restart Required: Yes

Instructions:

1. Backup your Tautulli configuration and database. 2. Stop Tautulli service. 3. Update to v2.16.0 via git pull or download new release. 4. Restart Tautulli service. 5. Verify version is 2.16.0 or higher.

🔧 Temporary Workarounds

Disable Git Update Feature

all

Prevent exploitation by disabling git-based updates in Tautulli configuration

Edit Tautulli config.ini and set: check_github = 0
Restart Tautulli service

Network Segmentation

all

Restrict access to Tautulli web interface to trusted networks only

Configure firewall rules to limit access to Tautulli port (default 8181)

🧯 If You Can't Patch

  • Implement strict access controls to Tautulli admin interface
  • Monitor for suspicious git command execution and shell activity

🔍 How to Verify

Check if Vulnerable:

Check Tautulli version in web interface Settings > General, or run: python tautulli.py --version

Check Version:

python tautulli.py --version

Verify Fix Applied:

Confirm version is 2.16.0 or higher in web interface or via command line

📡 Detection & Monitoring

Log Indicators:

  • Unusual git commands in Tautulli logs
  • Shell command execution from Tautulli process
  • Failed authentication attempts to admin interface

Network Indicators:

  • Unusual outbound connections from Tautulli server
  • Git protocol traffic to unexpected destinations

SIEM Query:

process.name: 'python' AND process.args: '*git*' AND process.parent.name: 'tautulli'

🔗 References

📤 Share & Export