Path Traversal Vulnerability in Tautulli for Plex Media Server
CVE-2025-58761

8.6HIGH

Key Information:

Vendor

Tautulli

Status
Vendor
CVE Published:
9 September 2025

What is CVE-2025-58761?

Tautulli, a monitoring tool for Plex Media Server, is prone to a path traversal vulnerability affecting versions up to 2.15.3. This flaw allows unauthenticated attackers to exploit the real_pms_image_proxy endpoint by passing manipulated img URL parameters. By circumventing file path restrictions, attackers can access sensitive files on the application server, including critical configuration files and the SQLite database that stores active JWT tokens and hashed passwords. If an attacker retrieves valid credentials, they may gain administrative privileges and take control of the Tautulli application. An important update is available in version 2.16.0 which addresses this security issue.

Affected Version(s)

Tautulli < 2.16.0

References

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.