Access Control Flaw in Twonky Server by Rakuten
CVE-2025-13315

9.3CRITICAL

Key Information:

Vendor
CVE Published:
19 November 2025

Badges

📈 Score: 339👾 Exploit Exists🟡 Public PoC🟣 EPSS 82%

What is CVE-2025-13315?

CVE-2025-13315 is a notable vulnerability affecting Twonky Server, a media server application developed by Rakuten, designed for streaming and sharing media across devices in a network. The specific flaw pertains to access control, allowing an unauthenticated attacker to bypass the web service API authentication mechanisms. This results in the potential exposure of sensitive information, such as the administrator's username and encrypted password, by enabling attackers to access log files without proper authorization. The implications of this vulnerability could severely compromise the integrity and confidentiality of the systems running Twonky Server, as unauthorized access to administrative credentials can facilitate further attacks or unauthorized actions within the network.

Potential impact of CVE-2025-13315

  1. Unauthorized Access: The ability to bypass authentication controls presents a significant risk, enabling malicious actors to gain unauthorized access to sensitive system information, ultimately compromising the security posture of the organization.

  2. Credential Exposure: The leakage of the administrator's username and encrypted password could allow attackers to escalate privileges or perform unauthorized actions, increasing the likelihood of complete system compromise or further exploitation within the network environment.

  3. Increased Risk of Future Attacks: With the leaked credentials, attackers can potentially plan and execute subsequent attacks, exploiting escalated privileges to install malware, access confidential data, or facilitate lateral movements within the organization’s infrastructure.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Twonky Server Linux 8.5.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

82% chance of being exploited in the next 30 days.

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ryan Emmons, Staff Security Researcher at Rapid7
.