Ameeba Chat App store presentation
Download Ameeba Chat Today
Ameeba Blog Search

CVE-2025-58761: Critical Path Traversal Vulnerability in Tautulli v2.15.3 and Prior

Ameeba’s Mission: Safeguarding privacy by securing data and communication with our patented anonymization technology.

Overview

The vulnerability dubbed CVE-2025-58761 is a significant security flaw discovered in Tautulli, a Python-based monitoring and tracking tool employed by Plex Media Server. This vulnerability could potentially affect millions of users worldwide who use Plex Media Server for multimedia sharing and streaming. The gravity of this threat lies in its potential to give unauthenticated attackers the ability to read arbitrary files from the application server’s filesystem. If exploited, this vulnerability could lead to system compromise and data leakage, putting sensitive user information at risk.

Vulnerability Summary

CVE ID: CVE-2025-58761
Severity: High – CVSS Score 8.6
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise and data leakage

Affected Products

Ameeba Chat Icon Escape the Surveillance Era

Most apps won’t tell you the truth.
They’re part of the problem.

Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.

Ameeba Chat gives you a way out.

  • • No phone number
  • • No email
  • • No personal info
  • • Anonymous aliases
  • • End-to-end encrypted

Chat without a trace.

Product | Affected Versions

Tautulli | v2.15.3 and Prior

How the Exploit Works

The `real_pms_image_proxy` endpoint in Tautulli v2.15.3 and prior is susceptible to a path traversal attack. The endpoint is designed to fetch an image directly from the Plex Media Server. The image to be fetched is specified through an `img` URL parameter, which can either be a URL or a file path. However, an attacker can bypass the validation process by starting the `img` parameter with a valid prefix, then adjoining path traversal characters to reach files outside of intended directories. By exploiting this vulnerability, an attacker can exfiltrate files on the application file system, including the `config.ini` file containing the hashed admin password and the `tautulli.db` SQLite database containing active JWT tokens.

Conceptual Example Code

Here’s a hypothetical example of how an attacker could exploit this vulnerability using an HTTP request:

GET /real_pms_image_proxy?img=interfaces/default/images/../../../../../etc/passwd HTTP/1.1
Host: target.example.com

In this example, the attacker appends path traversal characters to the `img` parameter, attempting to fetch the `/etc/passwd` file, which is a sensitive file on Unix-based systems.

Impact of the Exploit

If the vulnerability is successfully exploited, an attacker could gain administrative control over the application. This could lead to a range of harmful outcomes, including unauthorized access to sensitive user data and the potential to manipulate or corrupt system files and data, leading to system instability or failure.

Suggested Remediation

The recommended solution to this vulnerability is to apply the vendor-supplied patch, which is available in version 2.16.0 of Tautulli. Until the patch can be applied, it’s advised to use a Web Application Firewall (WAF) or Intrusion Detection System (IDS) as a temporary mitigation to detect and block attempts to exploit this vulnerability.

Talk freely. Stay anonymous with Ameeba Chat.

Disclaimer:

The information and code presented in this article are provided for educational and defensive cybersecurity purposes only. Any conceptual or pseudocode examples are simplified representations intended to raise awareness and promote secure development and system configuration practices.

Do not use this information to attempt unauthorized access or exploit vulnerabilities on systems that you do not own or have explicit permission to test.

Ameeba and its authors do not endorse or condone malicious behavior and are not responsible for misuse of the content. Always follow ethical hacking guidelines, responsible disclosure practices, and local laws.
Ameeba Chat