Navidrome allows SQL Injection via role parameter
Package
Affected versions
>= 0.55.0, <= 0.55.2
Patched versions
0.56.0
Description
Published to the GitHub Advisory Database
May 29, 2025
Reviewed
May 29, 2025
Published by the National Vulnerability Database
May 30, 2025
Last updated
May 30, 2025
🛡 Security Advisory: SQL Injection Vulnerability in Navidrome v0.55.2
Overview
This vulnerability arises due to improper input validation on the
role
parameter within the API endpoint/api/artist
. Attackers can exploit this flaw to inject arbitrary SQL queries, potentially gaining unauthorized access to the backend database and compromising sensitive user information.Details
Vulnerable Component:
API endpoint →
/api/artist
Parameter →
role
Vulnerability Type:
SQL Injection (stacked queries, UNION queries)
Database Affected:
SQLite (confirmed exploitation via SQLite-specific payloads)
Impact:
Successful exploitation allows an unauthenticated attacker to:
Proof of Concept (PoC)
Example Exploit Command:
Sample Payloads:
Stacked Queries:
UNION-Based Query:
Example HTTP Request:
References