Description
Navidrome is an open source web-based music collection server and streamer. Prior to version 0.60.0, a cross-site scripting vulnerability in the frontend allows a malicious attacker to inject code through the comment metadata of a song to exfiltrate user credentials. This issue has been patched in version 0.60.0.
Published: 2026-02-04
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting that enables credential exfiltration
Action: Patch
AI Analysis

Impact

Navidrome, an open‑source web‑based music server, has a client‑side cross‑site scripting flaw that lets a malicious author insert arbitrary JavaScript into a song’s comment metadata. Because the application displays this metadata unescaped in the browser, an attacker can run script in the victim’s session and harvest authentication tokens or other credentials stored in the client’s cookies or local storage. The weakness is a classic reflected XSS (CWE‑79/80) that affects confidentiality by enabling credential theft and potentially session hijacking. Based on the description, it is inferred that the attack vector requires an attacker to first add or edit a comment in a song’s metadata using the UI, a capability normally limited to authenticated users.

Affected Systems

All instances of the Navidrome server released before version 0.60.0 are prone to this issue. The vendor’s advisory lists the product as navidrome:navidrome and the fix is incorporated in the 0.60.0 release. The vulnerability is present in the front‑end JavaScript code that renders song metadata comments, so every deployment that supplies unescaped comments is affected regardless of the underlying operating system or hosting environment.

Risk and Exploitability

The flaw receives a 6.1 CVSS score, indicating a moderate risk when an exploit is successful. The EPSS ranking is below 1 %, showing that, at the time of assessment, the probability of active exploitation was low. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires access to the UI used to add or edit song comments, which is typically restricted to authenticated users. Once an attacker can inject a comment, however, the client‑side script runs with the victim’s privileges and can exfiltrate credentials, offering high damage potential for the compromised account.

Generated by OpenCVE AI on April 18, 2026 at 13:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Navidrome server to version 0.60.0 or newer, which removes the unsafe comment rendering path.
  • Restart the service so the updated binaries and configurations take effect.
  • If an immediate upgrade is not possible, disable or filter the comment input field to strip script tags until the patch can be applied.

Generated by OpenCVE AI on April 18, 2026 at 13:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rh3r-8pxm-hg4w Navidrome has XSS via comment from song metadata
History

Wed, 18 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:navidrome:navidrome:*:*:*:*:*:*:*:*

Thu, 05 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Feb 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Navidrome
Navidrome navidrome
Vendors & Products Navidrome
Navidrome navidrome

Wed, 04 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Description Navidrome is an open source web-based music collection server and streamer. Prior to version 0.60.0, a cross-site scripting vulnerability in the frontend allows a malicious attacker to inject code through the comment metadata of a song to exfiltrate user credentials. This issue has been patched in version 0.60.0.
Title Navidrome is vulnerable to XSS via comment from song metadata
Weaknesses CWE-79
CWE-80
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N'}


Subscriptions

Navidrome Navidrome
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-05T14:31:27.664Z

Reserved: 2026-02-03T01:02:46.714Z

Link: CVE-2026-25578

cve-icon Vulnrichment

Updated: 2026-02-05T14:20:05.728Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-04T22:16:01.107

Modified: 2026-02-18T19:03:44.243

Link: CVE-2026-25578

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:45:45Z

Weaknesses