LibreTime 3.0.0-alpha.10 and possibly earlier is vulnerable to Broken Access Control, where a user with the DJ role can access analytics data via the Web UI and direct API calls. The backend does not verify role-based permissions for analytics endpoints, allowing unauthorized retrieval of station-wide metrics. This results in information disclosure to less privileged users.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 23 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Libretime
Libretime libretime
Vendors & Products Libretime
Libretime libretime

Wed, 22 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 21 Oct 2025 17:30:00 +0000

Type Values Removed Values Added
Description LibreTime 3.0.0-alpha.10 and possibly earlier is vulnerable to Broken Access Control, where a user with the DJ role can access analytics data via the Web UI and direct API calls. The backend does not verify role-based permissions for analytics endpoints, allowing unauthorized retrieval of station-wide metrics. This results in information disclosure to less privileged users.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-22T14:52:12.820Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-60427

cve-icon Vulnrichment

Updated: 2025-10-22T14:52:07.275Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-21T18:15:36.307

Modified: 2025-10-22T15:16:00.853

Link: CVE-2025-60427

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-23T13:12:00Z