CVE-2025-49143: Nautobot may allows uploaded media files to be accessible without authentication
Files uploaded by users to Nautobot’s MEDIA_ROOT
directory, including DeviceType image attachments as well as images attached to a Location, Device, or Rack, are served to users via a URL endpoint that was not enforcing user authentication. As a consequence, such files can be retrieved by anonymous users who know or can guess the correct URL for a given file.
For DeviceType image attachments, a mitigating factor is that no URL endpoint exists for listing the contents of the devicetype-images/
subdirectory, and the file names are as specified by the uploading user, so any given DeviceType image attachment can only be retrieved by correctly guessing its file name.
Similarly, for all other image attachments, while the images can be listed by accessing the /api/extras/image-attachments/
endpoint as an authenticated user only, absent that authenticated access, accessing the files would again require guessing file names correctly.
References
- github.com/advisories/GHSA-rh67-4c8j-hjjh
- github.com/nautobot/nautobot
- github.com/nautobot/nautobot/commit/9c892dc300429948a4714f743c9c2879d8987340
- github.com/nautobot/nautobot/commit/d99a53b065129cff3a0fa9abe7355a9ef1ad4c95
- github.com/nautobot/nautobot/pull/6672
- github.com/nautobot/nautobot/pull/6703
- github.com/nautobot/nautobot/security/advisories/GHSA-rh67-4c8j-hjjh
- nvd.nist.gov/vuln/detail/CVE-2025-49143
Code Behaviors & Features
Detect and mitigate CVE-2025-49143 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →