CVE-2025-64113
📋 TL;DR
CVE-2025-64113 is an authentication bypass vulnerability in Emby Server that allows attackers to gain full administrative access to the media server. Any Emby Server instance running versions below 4.9.1.81 is vulnerable, regardless of configuration. Attackers only need network access to exploit this vulnerability.
💻 Affected Systems
- Emby Server
📦 What is this software?
Emby by Emby
Emby by Emby
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of Emby Server with administrative privileges, allowing attackers to modify server settings, access all media content, install malicious plugins, and potentially pivot to other systems on the network.
Likely Case
Unauthorized administrative access leading to media content theft, server configuration changes, and potential data exfiltration.
If Mitigated
Limited impact if server is isolated behind strict network controls with no internet exposure.
🎯 Exploit Status
The advisory suggests exploitation requires only network access with no authentication or special conditions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.9.1.81
Vendor Advisory: https://github.com/EmbySupport/Emby.Security/security/advisories/GHSA-95fv-5gfj-2r84
Restart Required: Yes
Instructions:
1. Download Emby Server 4.9.1.81 from official sources. 2. Stop the Emby Server service. 3. Install the update. 4. Restart the Emby Server service.
🔧 Temporary Workarounds
Network Isolation
allRestrict network access to Emby Server using firewall rules
# Linux iptables example: iptables -A INPUT -p tcp --dport 8096 -s trusted_ip -j ACCEPT
# Windows Firewall: New-NetFirewallRule -DisplayName 'Emby Access' -Direction Inbound -Protocol TCP -LocalPort 8096 -RemoteAddress trusted_ip -Action Allow
🧯 If You Can't Patch
- Immediately restrict network access to Emby Server using firewall rules to only trusted IP addresses
- Monitor Emby Server logs for unauthorized access attempts and consider taking the server offline until patching is possible
🔍 How to Verify
Check if Vulnerable:
Check Emby Server version in web interface dashboard or via system information page
Check Version:
# Linux: emby-server --version or check /usr/lib/emby-server/system/EmbyServer.dll version
# Windows: Check installed programs list or Emby Server tray icon version info
Verify Fix Applied:
Confirm version is 4.9.1.81 or higher in Emby Server dashboard
📡 Detection & Monitoring
Log Indicators:
- Unexpected administrative login events
- Configuration changes from unknown IP addresses
- Failed authentication attempts followed by successful administrative access
Network Indicators:
- Unusual administrative API calls from unexpected sources
- Traffic to Emby Server administrative endpoints from unauthorized IPs
SIEM Query:
source='emby.log' AND (event='AdminLogin' OR event='ConfigurationChange') AND src_ip NOT IN (trusted_ip_list)