AzuraCast is a self-hosted, all-in-one web radio management suite. Versions 0.23.1 mistakenly include an API endpoint that is intended for internal use by the SFTP software sftpgo, exposing it to the public-facing HTTP API for AzuraCast installations. A user with specific internal knowledge of a station's operations can craft a custom HTTP request that would affect the contents of a station's database, without revealing any internal information about the station. In order to carry out an attack, a malicious user would need to know a valid SFTP station username and the coordinating internal filesystem structure. This issue is fixed in version 0.23.2.
Metrics
Affected Vendors & Products
References
History
Fri, 12 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Dec 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AzuraCast is a self-hosted, all-in-one web radio management suite. Versions 0.23.1 mistakenly include an API endpoint that is intended for internal use by the SFTP software sftpgo, exposing it to the public-facing HTTP API for AzuraCast installations. A user with specific internal knowledge of a station's operations can craft a custom HTTP request that would affect the contents of a station's database, without revealing any internal information about the station. In order to carry out an attack, a malicious user would need to know a valid SFTP station username and the coordinating internal filesystem structure. This issue is fixed in version 0.23.2. | |
| Title | AzuraCast Vulnerable to Pre-Auth File Deletion & Admin RCE | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-12-12T06:53:15.213Z
Updated: 2025-12-12T20:39:38.708Z
Reserved: 2025-12-11T00:45:45.791Z
Link: CVE-2025-67737
Updated: 2025-12-12T20:39:33.291Z
Status : Awaiting Analysis
Published: 2025-12-12T07:15:45.417
Modified: 2025-12-12T15:17:31.973
Link: CVE-2025-67737
No data.