We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49143

Nautobot may allows uploaded media files to be accessible without authentication



Description

Nautobot is a Network Source of Truth and Network Automation Platform. Prior to v2.4.10 and v1.6.32 , files uploaded by users to Nautobot's MEDIA_ROOT directory, including DeviceType image attachments as well as images attached to a Location, Device, or Rack, are served to users via a URL endpoint that was not enforcing user authentication. As a consequence, such files can be retrieved by anonymous users who know or can guess the correct URL for a given file. Nautobot v2.4.10 and v1.6.32 address this issue by adding enforcement of Nautobot user authentication to this endpoint.

Reserved 2025-06-02 | Published 2025-06-10 | Updated 2025-06-10 | Assigner GitHub_M


MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< 1.6.32
affected

>= 2.0.0, < 2.4.10
affected

References

github.com/...utobot/security/advisories/GHSA-rh67-4c8j-hjjh

github.com/nautobot/nautobot/pull/6672

github.com/nautobot/nautobot/pull/6703

github.com/...ommit/9c892dc300429948a4714f743c9c2879d8987340

github.com/...ommit/d99a53b065129cff3a0fa9abe7355a9ef1ad4c95

cve.org (CVE-2025-49143)

nvd.nist.gov (CVE-2025-49143)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49143

Support options

Helpdesk Chat, Email, Knowledgebase