Impact
The immich application transmits the password that authenticates a user to a shared album in the URL query string of a GET request to /api/shared-links/me. This exposes the password in browser history, proxy logs, server logs, and referrer headers, allowing unintended disclosure of authentication credentials. The result is potential compromise of shared album access and unauthorized exposure of sensitive user data. The weakness is a classic credential transmission flaw (CWE‑598).
Affected Systems
All installations of the immich photo and video management solution running a version earlier than 2.6.0 are vulnerable. The issue was patched in immich v2.6.0 and later releases.
Risk and Exploitability
The vulnerability carries a CVSS score of 6.3, indicating moderate severity. No EPSS score is available, and it is not listed in the CISA KEV catalog, suggesting limited evidence of active exploitation. Based on the description, the likely attack vector is remote interception or observation of the GET request that includes the password in the query string, allowing an attacker to retrieve the credentials from logs or network traffic. The exploit requires no user interaction beyond accessing the shared album, making it relatively straightforward for an adversary to leverage.
OpenCVE Enrichment