CVE-2025-69415

7.1 HIGH

📋 TL;DR

This vulnerability in Plex Media Server allows attackers to access account information using device tokens even after devices have been disassociated from accounts. It affects all Plex Media Server users running vulnerable versions, potentially exposing sensitive account data.

💻 Affected Systems

Products:
  • Plex Media Server
Versions: through 1.42.2.10156
Operating Systems: All platforms running Plex Media Server
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access and potentially modify account information, change settings, or gain unauthorized access to media libraries and personal data.

🟠

Likely Case

Unauthorized access to account details and configuration settings, potentially leading to privacy violations.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though account information exposure remains possible.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a valid device token but not current account association, making it relatively straightforward for attackers with previously obtained tokens.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.42.2.10156

Vendor Advisory: https://forums.plex.tv/t/security-update-plex-media-server/

Restart Required: Yes

Instructions:

1. Open Plex Media Server settings. 2. Navigate to General settings. 3. Click 'Check for Updates' and install the latest version. 4. Restart the Plex Media Server service.

🔧 Temporary Workarounds

Disable Remote Access

all

Prevents external exploitation by disabling remote access to Plex Media Server

In Plex Web UI: Settings > Remote Access > Disable Remote Access

Network Segmentation

all

Restrict Plex server to internal network only using firewall rules

sudo ufw deny from any to any port 32400
Windows Firewall: Block inbound port 32400

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Plex server
  • Regularly rotate device tokens and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Plex Media Server version in Settings > General > Version. If version is 1.42.2.10156 or earlier, you are vulnerable.

Check Version:

On Linux: cat /usr/lib/plexmediaserver/version  | On Windows: Check Plex settings in web UI

Verify Fix Applied:

Verify version is greater than 1.42.2.10156 and test that device tokens from disassociated devices no longer grant access to /myplex/account endpoint.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /myplex/account endpoint
  • Access attempts using device tokens from previously associated devices

Network Indicators:

  • HTTP requests to /myplex/account with device tokens
  • Unusual traffic patterns to Plex server port 32400

SIEM Query:

source="plex.log" AND (uri="/myplex/account" OR uri="/myplex/*") AND status=200

🔗 References

📤 Share & Export