Description
Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.32.2, the GET /api/collections and GET /api/collections/:id endpoints return collections from all libraries without checking whether the requesting user has access to each collection's library. An authenticated user with access to any library can enumerate and read collections (including full book metadata) from libraries they are explicitly restricted from accessing. This vulnerability is fixed in 2.32.2.
Published: 2026-05-11
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability lies in Audiobookshelf's collection API. The GET /api/collections and GET /api/collections/:id endpoints return all collections regardless of which libraries each collection belongs to. Because the endpoints skip the access‑control check, an authenticated user who has access to any library can enumerate and read collections, including full book metadata, from libraries the user is not authorized to view. This results in the disclosure of potentially sensitive metadata. The weakness is rooted in missing authorization checks (CWE‑863).

Affected Systems

The affected product is Audiobookshelf by advplyr, which is distributed as a self‑hosted audiobook and podcast server. Versions before 2.32.2 are vulnerable; all releases up to and including 2.32.1 lack the fix.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate risk. No EPSS score is publicly available, and the vulnerability is not listed in the CISA KEV catalog. Because an attacker only needs to be a legitimate authenticated user with any library access, the exploitation effort is low. The most likely attack vector is an internal user or compromised account that can enumerate collections across all libraries.

Generated by OpenCVE AI on May 11, 2026 at 22:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Audiobookshelf to version 2.32.2 or later to install the fix.
  • Review and re‑apply library‑based access controls to ensure that only users with explicit permission can view collection data; adjust any custom scripts or integrations accordingly.
  • If an immediate upgrade is not feasible, temporarily disable the GET /api/collections endpoints for users who do not have explicit library permissions, reducing the attack surface until a patch can be applied.

Generated by OpenCVE AI on May 11, 2026 at 22:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Advplyr
Advplyr audiobookshelf
Vendors & Products Advplyr
Advplyr audiobookshelf

Mon, 11 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.32.2, the GET /api/collections and GET /api/collections/:id endpoints return collections from all libraries without checking whether the requesting user has access to each collection's library. An authenticated user with access to any library can enumerate and read collections (including full book metadata) from libraries they are explicitly restricted from accessing. This vulnerability is fixed in 2.32.2.
Title Audiobookshelf: Collection endpoints bypass library access controls exposing restricted library data
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Advplyr Audiobookshelf
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-12T13:25:42.923Z

Reserved: 2026-04-30T18:49:06.712Z

Link: CVE-2026-42884

cve-icon Vulnrichment

Updated: 2026-05-12T13:24:32.257Z

cve-icon NVD

Status : Deferred

Published: 2026-05-11T20:25:44.740

Modified: 2026-05-12T14:50:18.527

Link: CVE-2026-42884

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T22:45:36Z

Weaknesses