{"id":"CVE-2025-48948","summary":"Navidrome Transcoding Permission Bypass Vulnerability Report","details":"Navidrome is an open source web-based music collection server and streamer. A permission verification flaw in versions prior to 0.56.0 allows any authenticated regular user to bypass authorization checks and perform administrator-only transcoding configuration operations, including creating, modifying, and deleting transcoding settings. In the threat model where administrators are trusted but regular users are not, this vulnerability represents a significant security risk when transcoding is enabled. Version 0.56.0 patches the issue.","aliases":["GHSA-f238-rggp-82m3","GO-2025-3733"],"modified":"2026-04-10T05:28:52.636247Z","published":"2025-05-30T19:25:41.422Z","related":["openSUSE-SU-2025:15225-1"],"database_specific":{"cwe_ids":["CWE-863"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/48xxx/CVE-2025-48948.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/48xxx/CVE-2025-48948.json"},{"type":"ADVISORY","url":"https://github.com/navidrome/navidrome/security/advisories/GHSA-f238-rggp-82m3"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-48948"},{"type":"FIX","url":"https://github.com/navidrome/navidrome/commit/e5438552c63fecb6284e1b179dddae91ede869c8"},{"type":"FIX","url":"https://github.com/navidrome/navidrome/pull/4096"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/navidrome/navidrome","events":[{"introduced":"0"},{"fixed":"b19d5f0d3e079639904cac95735228f445c798b6"}]}],"versions":["v0.10.0","v0.11.0","v0.11.1","v0.12.0","v0.13.0","v0.14.0","v0.14.1","v0.14.2","v0.14.3","v0.14.4","v0.14.5","v0.15.0","v0.16.0","v0.16.1","v0.17.0","v0.18.0","v0.19.0","v0.20.0","v0.21.0","v0.22.0","v0.23.0","v0.23.1","v0.24.0","v0.25.0","v0.26.0","v0.26.1","v0.27.0","v0.28.0","v0.29.0","v0.3.0","v0.3.1","v0.3.2","v0.30.0","v0.30.1","v0.31.0","v0.32.0","v0.33.0","v0.34.0","v0.34.1","v0.35.0","v0.35.1","v0.36.0","v0.36.1","v0.37.0","v0.38.0","v0.39.0","v0.4.0","v0.4.1","v0.4.2","v0.40.0","v0.41.0","v0.42.0","v0.43.0","v0.44.0","v0.44.1","v0.45.0","v0.45.1","v0.46.0","v0.47.0","v0.47.5","v0.48.0","v0.49.0","v0.49.1","v0.49.2","v0.49.3","v0.5.0","v0.50.0","v0.50.1","v0.51.0","v0.51.1","v0.52.0","v0.52.5","v0.53.0","v0.53.1","v0.53.2","v0.53.3","v0.54.1","v0.54.2","v0.54.3","v0.54.4","v0.55.0","v0.55.1","v0.55.2","v0.6.0","v0.6.1","v0.6.2","v0.7.0","v0.7.1","v0.7.2","v0.7.3","v0.8.0","v0.8.1","v0.8.2","v0.8.3","v0.8.4","v0.9.0","v0.9.1","v0.9.2","v0.9.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-48948.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P"}]}