Description
immich is a high performance self-hosted photo and video management solution. Prior to version 2.6.0, the Immich application is vulnerable to credential disclosure when a user authenticates to a shared album. During the authentication process, the application transmits the album password within the URL query parameters in a GET request to /api/shared-links/me. This exposes the password in browser history, proxy and server logs, and referrer headers, allowing unintended disclosure of authentication credentials. The impact of this vulnerability is the potential compromise of shared album access and unauthorized exposure of sensitive user data. This issue has been patched in version 2.6.0.
Published: 2026-04-03
Score: 6.3 Medium
EPSS: n/a
KEV: No
Impact: Credential Disclosure
Action: Patch Now
AI Analysis

Impact

The immich application transmits the password that authenticates a user to a shared album in the URL query string of a GET request to /api/shared-links/me. This exposes the password in browser history, proxy logs, server logs, and referrer headers, allowing unintended disclosure of authentication credentials. The result is potential compromise of shared album access and unauthorized exposure of sensitive user data. The weakness is a classic credential transmission flaw (CWE‑598).

Affected Systems

All installations of the immich photo and video management solution running a version earlier than 2.6.0 are vulnerable. The issue was patched in immich v2.6.0 and later releases.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.3, indicating moderate severity. No EPSS score is available, and it is not listed in the CISA KEV catalog, suggesting limited evidence of active exploitation. Based on the description, the likely attack vector is remote interception or observation of the GET request that includes the password in the query string, allowing an attacker to retrieve the credentials from logs or network traffic. The exploit requires no user interaction beyond accessing the shared album, making it relatively straightforward for an adversary to leverage.

Generated by OpenCVE AI on April 3, 2026 at 18:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade immich to version 2.6.0 or later.

Generated by OpenCVE AI on April 3, 2026 at 18:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 05:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Immich-app
Immich-app immich
Vendors & Products Immich-app
Immich-app immich

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description immich is a high performance self-hosted photo and video management solution. Prior to version 2.6.0, the Immich application is vulnerable to credential disclosure when a user authenticates to a shared album. During the authentication process, the application transmits the album password within the URL query parameters in a GET request to /api/shared-links/me. This exposes the password in browser history, proxy and server logs, and referrer headers, allowing unintended disclosure of authentication credentials. The impact of this vulnerability is the potential compromise of shared album access and unauthorized exposure of sensitive user data. This issue has been patched in version 2.6.0.
Title immich-server: Insecure Transmission of Authentication Credentials via Password Parameter in HTTP Request Query String When Accessing Shared Albums
Weaknesses CWE-598
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Immich-app Immich
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-04T03:19:19.166Z

Reserved: 2026-01-29T14:03:42.539Z

Link: CVE-2026-25118

cve-icon Vulnrichment

Updated: 2026-04-04T03:19:14.023Z

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:36.023

Modified: 2026-04-03T16:16:36.023

Link: CVE-2026-25118

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:15:09Z

Weaknesses