Spotipy's cache file, containing spotify auth token, is created with overly broad permissions
CVE-2025-27154
8.4HIGH
Key Information:
- Vendor
- Spotipy-dev
- Status
- Spotipy
- Vendor
- CVE Published:
- 27 February 2025
Summary
Spotipy is a lightweight Python library for the Spotify Web API. The CacheHandler
class creates a cache file to store the auth token. Prior to version 2.25.1, the file created has rw-r--r--
(644) permissions by default, when it could be locked down to rw-------
(600) permissions. This leads to overly broad exposure of the spotify auth token. If this token can be read by an attacker (another user on the machine, or a process running as another user), it can be used to perform administrative actions on the Spotify account, depending on the scope granted to the token. Version 2.25.1 tightens the cache file permissions.
Affected Version(s)
spotipy < 2.25.1
References
CVSS V4
Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved