Audiobookshelf

5 CVEs product

Monthly

CVE-2026-27963 MEDIUM POC PATCH This Month

Stored XSS in Audiobookshelf prior to version 2.32.0 enables privileged users to inject malicious code into library metadata that executes in other users' browsers, potentially compromising sessions and enabling data theft. Public exploit code exists for this vulnerability. A patch is available in version 2.32.0 and later.

XSS Audiobookshelf
NVD GitHub
CVSS 3.1
4.8
EPSS
0.0%
CVE-2026-27973 MEDIUM PATCH This Month

Stored XSS in Audiobookshelf Mobile App prior to version 0.12.0-beta allows authenticated users with library modification privileges to inject malicious JavaScript through metadata, enabling arbitrary code execution within victim users' browsers and WebViews. Successful exploitation could lead to session hijacking, data theft, and unauthorized access to native device APIs. A patch is available in version 0.12.0-beta and later.

XSS Audiobookshelf Mobile App Audiobookshelf
NVD GitHub
CVSS 3.1
4.0
EPSS
0.0%
CVE-2025-57800 HIGH POC PATCH This Week

Audiobookshelf is an open-source self-hosted audiobook server. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Audiobookshelf
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-46338 MEDIUM POC PATCH This Month

Audiobookshelf is a self-hosted audiobook and podcast server. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

XSS Audiobookshelf
NVD GitHub
CVSS 4.0
6.9
EPSS
0.3%
CVE-2025-25205 HIGH POC PATCH This Week

Audiobookshelf is a self-hosted audiobook and podcast server. Rated high severity (CVSS 8.2), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Authentication Bypass Denial Of Service Audiobookshelf
NVD GitHub
CVSS 3.1
8.2
EPSS
0.6%
CVE-2026-27963
EPSS 0% CVSS 4.8
MEDIUM POC PATCH This Month

Stored XSS in Audiobookshelf prior to version 2.32.0 enables privileged users to inject malicious code into library metadata that executes in other users' browsers, potentially compromising sessions and enabling data theft. Public exploit code exists for this vulnerability. A patch is available in version 2.32.0 and later.

XSS Audiobookshelf
NVD GitHub
CVE-2026-27973
EPSS 0% CVSS 4.0
MEDIUM PATCH This Month

Stored XSS in Audiobookshelf Mobile App prior to version 0.12.0-beta allows authenticated users with library modification privileges to inject malicious JavaScript through metadata, enabling arbitrary code execution within victim users' browsers and WebViews. Successful exploitation could lead to session hijacking, data theft, and unauthorized access to native device APIs. A patch is available in version 0.12.0-beta and later.

XSS Audiobookshelf Mobile App Audiobookshelf
NVD GitHub
CVE-2025-57800
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Audiobookshelf is an open-source self-hosted audiobook server. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Audiobookshelf
NVD GitHub
CVE-2025-46338
EPSS 0% CVSS 6.9
MEDIUM POC PATCH This Month

Audiobookshelf is a self-hosted audiobook and podcast server. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

XSS Audiobookshelf
NVD GitHub
CVE-2025-25205
EPSS 1% CVSS 8.2
HIGH POC PATCH This Week

Audiobookshelf is a self-hosted audiobook and podcast server. Rated high severity (CVSS 8.2), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Authentication Bypass Denial Of Service +1
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy