Access Control Flaw in Twonky Server by Rakuten
CVE-2025-13315
Key Information:
- Vendor
Lynxtechnology
- Status
- Vendor
- CVE Published:
- 19 November 2025
Badges
What is CVE-2025-13315?
CVE-2025-13315 is a notable vulnerability affecting Twonky Server, a media server application developed by Rakuten, designed for streaming and sharing media across devices in a network. The specific flaw pertains to access control, allowing an unauthenticated attacker to bypass the web service API authentication mechanisms. This results in the potential exposure of sensitive information, such as the administrator's username and encrypted password, by enabling attackers to access log files without proper authorization. The implications of this vulnerability could severely compromise the integrity and confidentiality of the systems running Twonky Server, as unauthorized access to administrative credentials can facilitate further attacks or unauthorized actions within the network.
Potential impact of CVE-2025-13315
-
Unauthorized Access: The ability to bypass authentication controls presents a significant risk, enabling malicious actors to gain unauthorized access to sensitive system information, ultimately compromising the security posture of the organization.
-
Credential Exposure: The leakage of the administrator's username and encrypted password could allow attackers to escalate privileges or perform unauthorized actions, increasing the likelihood of complete system compromise or further exploitation within the network environment.
-
Increased Risk of Future Attacks: With the leaked credentials, attackers can potentially plan and execute subsequent attacks, exploiting escalated privileges to install malware, access confidential data, or facilitate lateral movements within the organization’s infrastructure.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Twonky Server Linux 8.5.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
82% chance of being exploited in the next 30 days.
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
