Home

Description

immich is a high performance self-hosted photo and video management solution. Prior to version 2.6.0, the Immich application is vulnerable to credential disclosure when a user authenticates to a shared album. During the authentication process, the application transmits the album password within the URL query parameters in a GET request to /api/shared-links/me. This exposes the password in browser history, proxy and server logs, and referrer headers, allowing unintended disclosure of authentication credentials. The impact of this vulnerability is the potential compromise of shared album access and unauthorized exposure of sensitive user data. This issue has been patched in version 2.6.0.

PUBLISHED Reserved 2026-01-29 | Published 2026-04-03 | Updated 2026-04-04 | Assigner GitHub_M




MEDIUM: 6.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-598: Use of GET Request Method With Sensitive Query Strings

Product status

< 2.6.0
affected

References

github.com/...immich/security/advisories/GHSA-78x4-6x83-jx75

github.com/immich-app/immich/pull/26868

github.com/immich-app/immich/pull/26886

github.com/immich-app/immich/releases/tag/v2.6.0

cve.org (CVE-2026-25118)

nvd.nist.gov (CVE-2026-25118)

Download JSON