A vulnerability described as critical has been identified in owntone-server 2ca10d9 . Affected by this issue is some unknown functionality. Executing a manipulation can lead to buffer overflow. This vulnerability is registered as CVE-2025-44560 . The attack requires access to the local network. No exploit is available.
Full text archived locally
✦ AI Summary· Claude Sonnet
VDB-356831 · CVE-2025-44560 · ISSUE 1873
OWNTONE-SERVER 2CA10D9 BUFFER OVERFLOW
HISTORYDIFFRELATEJSONXMLCTI
CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score
5.5 $0-$5k 0.77+
Summaryinfo
A vulnerability classified as critical has been found in owntone-server 2ca10d9. This affects an unknown part. The manipulation leads to buffer overflow. This vulnerability is documented as CVE-2025-44560. There is not any exploit available.
Detailsinfo
A vulnerability was found in owntone-server 2ca10d9. It has been rated as critical. This issue affects some unknown processing. The manipulation with an unknown input leads to a buffer overflow vulnerability. Using CWE to declare the problem leads to CWE-120. The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
owntone-server 2ca10d9 is vulnerable to Buffer Overflow due to lack of recursive checking.
It is possible to read the advisory at github.com. The identification of this vulnerability is CVE-2025-44560 since 04/22/2025. The exploitation is known to be easy. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 04/10/2026).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Productinfo
Name
owntone-server
Version
2ca10d9
CPE 2.3info
🔒
CPE 2.2info
🔒
CVSSv4info
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv3info
VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5
VulDB Base Score: 5.5
VulDB Temp Score: 5.5
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv2info
Vector Complexity Authentication Confidentiality Integrity Availability
Unlock Unlock Unlock Unlock Unlock Unlock
Unlock Unlock Unlock Unlock Unlock Unlock
Unlock Unlock Unlock Unlock Unlock Unlock
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploitinginfo
Class: Buffer overflow
CWE: CWE-120 / CWE-119
CAPEC: 🔒
ATT&CK: 🔒
Physical: No
Local: No
Remote: Partially
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day Unlock Unlock Unlock Unlock
Today Unlock Unlock Unlock Unlock
Threat Intelligenceinfo
Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍
Countermeasuresinfo
Recommended: no mitigation known
Status: 🔍
0-Day Time: 🔒
Timelineinfo
04/22/2025 CVE reserved
04/10/2026 +353 days Advisory disclosed
04/10/2026 +0 days VulDB entry created
04/10/2026 +0 days VulDB entry last update
Sourcesinfo
Advisory: 1873
Status: Confirmed
CVE: CVE-2025-44560 (🔒)
GCVE (CVE): GCVE-0-2025-44560
GCVE (VulDB): GCVE-100-356831
Entryinfo
Created: 04/10/2026 17:25
Changes: 04/10/2026 17:25 (52)
Complete: 🔍
Cache ID: 99:198:101
Discussion
No comments yet. Languages: en.
Please log in to comment.
◂ PreviousOverviewNext ▸