Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/jon4hz/jellysweep
  4. ›
  5. CVE-2025-64178

CVE-2025-64178: Jellysweep uses uncontrolled data in image cache API endpoint

November 4, 2025 (updated November 7, 2025)

The /api/images/cache which is used to download media posters from the server accepted an url parameter, which was directly passed to the cache package and that downloaded the poster from this URL. This URL parameter can be used to make the jellysweep server download arbitrary content.

The API endpoint can only be used by authenticated users.

References

  • github.com/advisories/GHSA-xc93-q32j-cpcg
  • github.com/jon4hz/jellysweep
  • github.com/jon4hz/jellysweep/commit/17466312510966418aea941e4944229856d55101
  • github.com/jon4hz/jellysweep/security/advisories/GHSA-xc93-q32j-cpcg
  • nvd.nist.gov/vuln/detail/CVE-2025-64178

Code Behaviors & Features

Detect and mitigate CVE-2025-64178 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.13.0

Fixed versions

  • 0.13.0

Solution

Upgrade to version 0.13.0 or above.

Weakness

  • CWE-918: Server-Side Request Forgery (SSRF)

Source file

go/github.com/jon4hz/jellysweep/CVE-2025-64178.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 24 Nov 2025 00:21:09 +0000.