CVE-2025-64178

N/A Unknown

📋 TL;DR

CVE-2025-64178 is a server-side request forgery (SSRF) vulnerability in Jellysweep, a cleanup tool for Jellyfin media servers. Authenticated users can exploit the /api/images/cache endpoint to make the server download arbitrary content from external URLs. This affects Jellysweep versions 0.12.1 and below.

💻 Affected Systems

Products:
  • Jellysweep
Versions: 0.12.1 and below
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations where Jellysweep is running and accessible to authenticated users.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could use the server as a proxy to scan internal networks, access internal services, or download malicious content that could lead to further compromise.

🟠

Likely Case

Authenticated malicious users could exfiltrate data from internal services, perform port scanning, or abuse the server's network position.

🟢

If Mitigated

With proper network segmentation and authentication controls, impact is limited to the server's network access scope.

🌐 Internet-Facing: MEDIUM - Internet-facing instances are vulnerable but require authentication, reducing exposure.
🏢 Internal Only: MEDIUM - Internal instances still pose risk if attackers gain authenticated access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once authentication is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.13.0

Vendor Advisory: https://github.com/jon4hz/jellysweep/security/advisories/GHSA-xc93-q32j-cpcg

Restart Required: Yes

Instructions:

1. Stop Jellysweep service. 2. Update to version 0.13.0 via package manager or manual installation. 3. Restart Jellysweep service.

🔧 Temporary Workarounds

Restrict network access

all

Limit Jellysweep's network access to only necessary Jellyfin servers

Use firewall rules to restrict outbound connections from Jellysweep

Disable vulnerable endpoint

all

Block access to /api/images/cache endpoint

Configure reverse proxy or firewall to block requests to /api/images/cache

🧯 If You Can't Patch

  • Implement strict authentication controls and monitor for suspicious authenticated sessions
  • Network segment Jellysweep to prevent it from accessing sensitive internal services

🔍 How to Verify

Check if Vulnerable:

Check Jellysweep version and compare to affected versions (0.12.1 and below)

Check Version:

jellysweep --version or check package manager

Verify Fix Applied:

Confirm version is 0.13.0 or higher and test that /api/images/cache endpoint no longer accepts arbitrary URLs

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound connections from Jellysweep to unexpected IPs/domains
  • Multiple requests to /api/images/cache with varying URL parameters

Network Indicators:

  • Jellysweep server making outbound connections to non-Jellyfin services
  • Unusual traffic patterns from Jellysweep to internal network segments

SIEM Query:

source="jellysweep" AND (url_path="/api/images/cache" OR dest_ip NOT IN (allowed_jellyfin_ips))

🔗 References

📤 Share & Export