Media Server

14 CVEs product

Monthly

CVE-2025-69417 MEDIUM POC This Month

In the plex.tv backend for Plex Media Server (PMS) through 2025-12-31, a non-server device token can retrieve share tokens (intended for unrelated access) via a shared_servers endpoint. [CVSS 5.0 MEDIUM]

Authentication Bypass Media Server
NVD GitHub
CVSS 3.1
5.0
EPSS
0.0%
CVE-2025-69416 MEDIUM POC This Month

In the plex.tv backend for Plex Media Server (PMS) through 2025-12-31, a non-server device token can retrieve other tokens (intended for unrelated access) via clients.plex.tv/devices.xml. [CVSS 5.0 MEDIUM]

Authentication Bypass Media Server
NVD GitHub
CVSS 3.1
5.0
EPSS
0.0%
CVE-2025-69415 HIGH POC This Week

In Plex Media Server (PMS) through 1.42.2.10156, ability to access /myplex/account with a device token is not properly aligned with whether the device is currently associated with an account. [CVSS 7.1 HIGH]

Information Disclosure Media Server
NVD GitHub
CVSS 3.1
7.1
EPSS
0.0%
CVE-2025-69414 HIGH POC This Week

Plex Media Server (PMS) through 1.42.2.10156 allows retrieval of a permanent access token via a /myplex/account call with a transient access token. [CVSS 8.5 HIGH]

Authentication Bypass Media Server
NVD GitHub
CVSS 3.1
8.5
EPSS
0.0%
CVE-2025-49197 MEDIUM This Month

A security vulnerability in application uses a weak password (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Media Server
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-49195 MEDIUM This Month

The FTP server’s login mechanism does not restrict authentication attempts, allowing an attacker to brute-force user passwords and potentially compromising the FTP server.

Information Disclosure Media Server
NVD
CVSS 3.1
5.3
EPSS
0.2%
CVE-2025-49194 HIGH This Week

Cleartext credential transmission vulnerability where a server accepts authentication methods that transmit credentials over unencrypted channels, allowing network-based attackers to intercept and expose user credentials without requiring authentication or user interaction. The vulnerability affects any server implementation supporting plaintext credential transmission over HTTP or other unencrypted protocols. This is a high-severity confidentiality issue (CVSS 7.5) with network-accessible attack vector and no complexity requirements, making it exploitable by unauthenticated remote attackers through passive network interception.

Information Disclosure Authentication Bypass Media Server
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-49193 MEDIUM This Month

The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an iFrame (Clickjacking attacks) or not executing injected malicious JavaScript code (XSS attacks).

XSS Baggage Analytics Package Analytics Field Analytics Logistic Diagnostic Analytics +2
NVD
CVSS 3.1
4.2
EPSS
0.1%
CVE-2025-49192 MEDIUM This Month

The web application is vulnerable to clickjacking attacks. The site can be embedded into another frame, allowing an attacker to trick a user into clicking on something different from what the user perceives. This could potentially reveal confidential information or allow others to take control of their computer while clicking on seemingly innocuous objects.

XSS Media Server Field Analytics
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-49189 MEDIUM This Month

CVE-2025-49189 is a security vulnerability (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Media Server
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-49186 MEDIUM This Month

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.

Information Disclosure Field Analytics Baggage Analytics Logistic Diagnostic Analytics Media Server +2
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-49183 HIGH This Week

CVE-2025-49183 is an unencrypted HTTP communication vulnerability in a REST API that exposes all traffic to network-level interception, allowing unauthenticated attackers to gather sensitive information and exfiltrate media files without authentication or user interaction required. The vulnerability affects systems using unencrypted REST API endpoints and carries a CVSS 7.5 score reflecting high confidentiality impact; real-world exploitation risk depends on network positioning and whether the affected API handles sensitive data or privileged operations.

Information Disclosure Media Server
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-49182 HIGH This Week

Critical credential exposure vulnerability where admin login credentials and property configuration passwords are embedded directly in source code, enabling unauthenticated remote attackers to gain full administrative access to the affected application. The vulnerability has a CVSS score of 7.5 (High) with a network attack vector requiring no privileges or user interaction. While specific KEV/EPSS data and POC availability are not provided in the input, the presence of hardcoded credentials in source code represents a severe and often easily discoverable weakness that typically sees rapid exploitation once disclosed.

Information Disclosure Authentication Bypass Media Server
NVD
CVSS 3.1
7.5
EPSS
0.2%
CVE-2025-49181 HIGH This Week

CVE-2025-49181 is an authorization bypass vulnerability in an unspecified API endpoint that allows unauthenticated remote attackers to read sensitive information via HTTP GET requests and modify service configuration (log paths, TCP ports) via HTTP POST requests, potentially causing denial of service. With a CVSS score of 8.6 and network-accessible attack vector requiring no authentication, this vulnerability presents a significant risk to exposed instances; KEV/EPSS/POC status cannot be confirmed from provided data, warranting immediate investigation of affected infrastructure.

Denial Of Service Authentication Bypass Information Disclosure Media Server
NVD
CVSS 3.1
8.6
EPSS
0.2%
CVE-2025-69417
EPSS 0% CVSS 5.0
MEDIUM POC This Month

In the plex.tv backend for Plex Media Server (PMS) through 2025-12-31, a non-server device token can retrieve share tokens (intended for unrelated access) via a shared_servers endpoint. [CVSS 5.0 MEDIUM]

Authentication Bypass Media Server
NVD GitHub
CVE-2025-69416
EPSS 0% CVSS 5.0
MEDIUM POC This Month

In the plex.tv backend for Plex Media Server (PMS) through 2025-12-31, a non-server device token can retrieve other tokens (intended for unrelated access) via clients.plex.tv/devices.xml. [CVSS 5.0 MEDIUM]

Authentication Bypass Media Server
NVD GitHub
CVE-2025-69415
EPSS 0% CVSS 7.1
HIGH POC This Week

In Plex Media Server (PMS) through 1.42.2.10156, ability to access /myplex/account with a device token is not properly aligned with whether the device is currently associated with an account. [CVSS 7.1 HIGH]

Information Disclosure Media Server
NVD GitHub
CVE-2025-69414
EPSS 0% CVSS 8.5
HIGH POC This Week

Plex Media Server (PMS) through 1.42.2.10156 allows retrieval of a permanent access token via a /myplex/account call with a transient access token. [CVSS 8.5 HIGH]

Authentication Bypass Media Server
NVD GitHub
CVE-2025-49197
EPSS 0% CVSS 6.5
MEDIUM This Month

A security vulnerability in application uses a weak password (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Media Server
NVD
CVE-2025-49195
EPSS 0% CVSS 5.3
MEDIUM This Month

The FTP server’s login mechanism does not restrict authentication attempts, allowing an attacker to brute-force user passwords and potentially compromising the FTP server.

Information Disclosure Media Server
NVD
CVE-2025-49194
EPSS 0% CVSS 7.5
HIGH This Week

Cleartext credential transmission vulnerability where a server accepts authentication methods that transmit credentials over unencrypted channels, allowing network-based attackers to intercept and expose user credentials without requiring authentication or user interaction. The vulnerability affects any server implementation supporting plaintext credential transmission over HTTP or other unencrypted protocols. This is a high-severity confidentiality issue (CVSS 7.5) with network-accessible attack vector and no complexity requirements, making it exploitable by unauthenticated remote attackers through passive network interception.

Information Disclosure Authentication Bypass Media Server
NVD
CVE-2025-49193
EPSS 0% CVSS 4.2
MEDIUM This Month

The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an iFrame (Clickjacking attacks) or not executing injected malicious JavaScript code (XSS attacks).

XSS Baggage Analytics Package Analytics +4
NVD
CVE-2025-49192
EPSS 0% CVSS 4.3
MEDIUM This Month

The web application is vulnerable to clickjacking attacks. The site can be embedded into another frame, allowing an attacker to trick a user into clicking on something different from what the user perceives. This could potentially reveal confidential information or allow others to take control of their computer while clicking on seemingly innocuous objects.

XSS Media Server Field Analytics
NVD
CVE-2025-49189
EPSS 0% CVSS 5.3
MEDIUM This Month

CVE-2025-49189 is a security vulnerability (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Media Server
NVD
CVE-2025-49186
EPSS 0% CVSS 5.3
MEDIUM This Month

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.

Information Disclosure Field Analytics Baggage Analytics +4
NVD
CVE-2025-49183
EPSS 0% CVSS 7.5
HIGH This Week

CVE-2025-49183 is an unencrypted HTTP communication vulnerability in a REST API that exposes all traffic to network-level interception, allowing unauthenticated attackers to gather sensitive information and exfiltrate media files without authentication or user interaction required. The vulnerability affects systems using unencrypted REST API endpoints and carries a CVSS 7.5 score reflecting high confidentiality impact; real-world exploitation risk depends on network positioning and whether the affected API handles sensitive data or privileged operations.

Information Disclosure Media Server
NVD
CVE-2025-49182
EPSS 0% CVSS 7.5
HIGH This Week

Critical credential exposure vulnerability where admin login credentials and property configuration passwords are embedded directly in source code, enabling unauthenticated remote attackers to gain full administrative access to the affected application. The vulnerability has a CVSS score of 7.5 (High) with a network attack vector requiring no privileges or user interaction. While specific KEV/EPSS data and POC availability are not provided in the input, the presence of hardcoded credentials in source code represents a severe and often easily discoverable weakness that typically sees rapid exploitation once disclosed.

Information Disclosure Authentication Bypass Media Server
NVD
CVE-2025-49181
EPSS 0% CVSS 8.6
HIGH This Week

CVE-2025-49181 is an authorization bypass vulnerability in an unspecified API endpoint that allows unauthenticated remote attackers to read sensitive information via HTTP GET requests and modify service configuration (log paths, TCP ports) via HTTP POST requests, potentially causing denial of service. With a CVSS score of 8.6 and network-accessible attack vector requiring no authentication, this vulnerability presents a significant risk to exposed instances; KEV/EPSS/POC status cannot be confirmed from provided data, warranting immediate investigation of affected infrastructure.

Denial Of Service Authentication Bypass Information Disclosure +1
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy