We found results for “”
CVE-2025-64178
Good to know:
Date: November 4, 2025
Impact The "/api/images/cache" which is used to download media posters from the server accepted an "url" parameter, which was directly passed to the cache package and that downloaded the poster from this URL. This URL parameter can be used to make the jellysweep server download arbitrary content. The API endpoint can only be used by authenticated users. Patches Fixed in "v0.13.0". The affected (and now fixed) library was also moved to "internal/" because it wasn't meant to be imported. References https://github.com/jon4hz/jellysweep/security/code-scanning/28
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Server-Side Request Forgery (SSRF)
CWE-918Top Fix
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | CHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | NONE |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


