First published: Tue Apr 29 2025(Updated: )
Audiobookshelf is a self-hosted audiobook and podcast server. Prior to version 2.21.0, an improper input handling vulnerability in the `/api/upload` endpoint allows an attacker to perform a reflected cross-site scripting (XSS) attack by submitting malicious payloads in the `libraryId` field. The unsanitized input is reflected in the server’s error message, enabling arbitrary JavaScript execution in a victim's browser. This issue has been patched in version 2.21.0.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Audiobookshelf | <2.21.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46338 has a medium severity rating due to its ability to allow attackers to perform reflected cross-site scripting (XSS) attacks.
To fix CVE-2025-46338, update Audiobookshelf to version 2.21.0 or later which addresses the improper input handling vulnerability.
CVE-2025-46338 affects all versions of Audiobookshelf prior to version 2.21.0.
Yes, CVE-2025-46338 can lead to data breaches as it allows attackers to execute arbitrary scripts in the context of the user's browser.
The attack vector for CVE-2025-46338 is the `/api/upload` endpoint, where an attacker can submit malicious payloads using the `libraryId` parameter.