Description
immich is a high performance self-hosted photo and video management solution. Versions prior to 2.7.3 contain an open redirect vulnerability in the shared album functionality, where the album name is inserted unsanitized into a <meta> tag in api.service.ts. A registered attacker can create a shared album with a crafted name containing 0;url=https://attackersite.com" http-equiv="refresh, which when rendered in the <meta property="og:title"> tag causes the victim's browser to redirect to an attacker-controlled site upon opening the share link. This facilitates phishing attacks, as the attacker could host a modified version of immich that collects login credentials from victims who believe they need to authenticate to view the shared album. This issue has been fixed in version 2.7.3.
Published: 2026-04-14
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Phishing via Open Redirect
Action: Update
AI Analysis

Impact

The vulnerability allows a registered attacker to create a shared album whose name contains a crafted meta tag that triggers a browser redirect to an arbitrary URL. When a victim opens the share link, the unsanitized album name is inserted into an og:title meta tag, causing the victim’s browser to navigate to the attacker‑controlled site. The attacker can then present a counterfeit version of immich to harvest credentials, enabling phishing attacks.

Affected Systems

This flaw exists in the immich self‑hosted photo and video management solution, specifically in all versions before 2.7.3 of immich-app:immich. No post‑2.7.3 releases are affected.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate risk; the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. The attack requires the victim to open a crafted shared album link, an action that can be achieved via email or messaging. The attacker’s ability to create such a link is limited to registered users, but once the link is exposed, victims can be redirected without authentication prompts, facilitating phishing and credential theft.

Generated by OpenCVE AI on April 15, 2026 at 01:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest immich update (v2.7.3 or later) to eliminate the open redirect flaw.
  • Avoid clicking on shared album links from unknown or untrusted senders until the vulnerability is patched.
  • Implement input validation or sanitization for album names to neutralize meta tag injection if patching is delayed.

Generated by OpenCVE AI on April 15, 2026 at 01:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Immich-app
Immich-app immich
Vendors & Products Immich-app
Immich-app immich

Wed, 15 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Description immich is a high performance self-hosted photo and video management solution. Versions prior to 2.7.3 contain an open redirect vulnerability in the shared album functionality, where the album name is inserted unsanitized into a <meta> tag in api.service.ts. A registered attacker can create a shared album with a crafted name containing 0;url=https://attackersite.com" http-equiv="refresh, which when rendered in the <meta property="og:title"> tag causes the victim's browser to redirect to an attacker-controlled site upon opening the share link. This facilitates phishing attacks, as the attacker could host a modified version of immich that collects login credentials from victims who believe they need to authenticate to view the shared album. This issue has been fixed in version 2.7.3.
Title immich: Open Redirect via Shared Album name
Weaknesses CWE-601
CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Immich-app Immich
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-15T16:19:07.744Z

Reserved: 2026-04-09T01:41:38.536Z

Link: CVE-2026-40096

cve-icon Vulnrichment

Updated: 2026-04-15T16:19:03.271Z

cve-icon NVD

Status : Received

Published: 2026-04-15T04:17:47.680

Modified: 2026-04-15T04:17:47.680

Link: CVE-2026-40096

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T13:49:14Z

Weaknesses