Description
Serviio PRO 1.8 contains an improper access control vulnerability in the Configuration REST API that allows unauthenticated attackers to change the mediabrowser login password. Attackers can send specially crafted requests to the REST API endpoints to modify credentials without authentication.
Published: 2026-03-15
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Password Change
Action: Immediate Patch
AI Analysis

Impact

Serviio PRO 1.8 contains an improper access control flaw in its REST configuration API that allows an attacker to send crafted requests and modify the media browser administrative password without any form of authentication. Because the API endpoint accepts password change commands without verifying the caller, the vulnerability leaves the service susceptible to unauthorized takeover of administrative credentials, effectively granting configuration control and potential access to all media content. The weakness is classified as CWE‑306, improper neutralization of authentication and authorization controls, and can be leveraged to gain persistent privileged access. The impact is that an attacker can fully control the Serviio instance by resetting or stealing its administrator credentials, enabling further exploitation of the media server or lateral movement within the network.

Affected Systems

The affected product is Serviio PRO version 1.8. No other versions or product variants are listed as impacted. Users running this specific version of the application are therefore exposed, regardless of their network environment or host configuration.

Risk and Exploitability

The CVSS base score of 8.7 indicates high severity, while the EPSS score of less than 1 % suggests a relatively low probability of exploitation in the wild. The vulnerability is not currently listed in the CISA KEV catalog, but publicly available proof‑of‑concept exploits and detailed advisories demonstrate that attack tools could be constructed. The likely attack vector is a remote network connection to the exposed REST API over HTTP or HTTPS; an attacker can trigger the password change by sending a specially crafted HTTP request without any authentication token. If successful, they can immediately assume administrative privileges, which may allow further compromise of the host or exploitation of other services.

Generated by OpenCVE AI on March 21, 2026 at 14:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Immediately change all Serviio administrative passwords and regenerate any credentials used by remote services.
  • Restrict network access to the Serviio REST API using firewall or host‑based controls so that only trusted IP addresses can reach the endpoints.
  • Install the latest Serviio PRO release available from the vendor, which includes a fix for this issue.
  • Configure the service to use HTTPS with a strong TLS configuration to reduce the risk of credential interception.
  • Enable auditing and monitor logs for suspicious REST API activity to detect any attempts to exploit this flaw.

Generated by OpenCVE AI on March 21, 2026 at 14:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Serviio
Serviio serviio Pro
Vendors & Products Serviio
Serviio serviio Pro

Sun, 15 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description Serviio PRO 1.8 contains an improper access control vulnerability in the Configuration REST API that allows unauthenticated attackers to change the mediabrowser login password. Attackers can send specially crafted requests to the REST API endpoints to modify credentials without authentication.
Title Serviio PRO 1.8 Unauthenticated Password Change via REST API
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Serviio Serviio Pro
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-16T14:20:17.530Z

Reserved: 2026-03-15T17:44:46.544Z

Link: CVE-2017-20220

cve-icon Vulnrichment

Updated: 2026-03-16T14:17:09.975Z

cve-icon NVD

Status : Deferred

Published: 2026-03-16T14:17:51.730

Modified: 2026-04-15T14:56:45.970

Link: CVE-2017-20220

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:19Z

Weaknesses