CVE-2026-23877

N/A Unknown

📋 TL;DR

Swing Music versions before 2.1.4 contain a directory traversal vulnerability in the list_folders() function. Authenticated users (including non-admins) can access arbitrary directories on the server filesystem. This affects all deployments running vulnerable versions of Swing Music.

💻 Affected Systems

Products:
  • Swing Music
Versions: All versions prior to 2.1.4
Operating Systems: All platforms running Swing Music
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access (any user role, not just admin).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files (passwords, SSH keys, configuration files), potentially leading to full server compromise.

🟠

Likely Case

Unauthorized access to music libraries, configuration files, and other application data stored on the server.

🟢

If Mitigated

Limited to accessing only intended music directories with proper input validation.

🌐 Internet-Facing: HIGH - Internet-facing instances allow authenticated attackers worldwide to exploit this vulnerability.
🏢 Internal Only: MEDIUM - Internal deployments still risk data exposure to authenticated internal users.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Directory traversal attacks are well-understood and easy to execute with basic web testing tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.4

Vendor Advisory: https://github.com/swingmx/swingmusic/security/advisories/GHSA-pj88-9xww-gxmh

Restart Required: Yes

Instructions:

1. Stop Swing Music service. 2. Update to version 2.1.4 via package manager or manual installation. 3. Restart the service.

🔧 Temporary Workarounds

Restrict User Access

all

Limit authenticated user accounts to trusted individuals only

Network Segmentation

all

Restrict network access to Swing Music to trusted networks only

🧯 If You Can't Patch

  • Implement strict file system permissions to limit Swing Music's access to only necessary directories
  • Deploy a web application firewall (WAF) with directory traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Check if Swing Music version is below 2.1.4. Test authenticated access to /folder/dir-browser endpoint with directory traversal payloads.

Check Version:

Check package manager or application logs for version information

Verify Fix Applied:

Confirm version is 2.1.4 or higher. Test that directory traversal attempts now return proper error messages.

📡 Detection & Monitoring

Log Indicators:

  • Unusual directory paths in /folder/dir-browser endpoint requests
  • Multiple failed attempts to access parent directories

Network Indicators:

  • HTTP requests containing '../' patterns to the vulnerable endpoint

SIEM Query:

source="swingmusic" AND (url="*/folder/dir-browser*" AND (url="*../*" OR url="*..\\*"))

🔗 References

📤 Share & Export