Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-xc93-q32j-cpcg: Jellysweep uses uncontrolled data in image cache API endpoint

Impact

The /api/images/cache which is used to download media posters from the server accepted an url parameter, which was directly passed to the cache package and that downloaded the poster from this URL. This URL parameter can be used to make the jellysweep server download arbitrary content.

The API endpoint can only be used by authenticated users.

Patches

Fixed in v0.13.0. The affected (and now fixed) library was also moved to internal/ because it wasn’t meant to be imported.

References

https://github.com/jon4hz/jellysweep/security/code-scanning/28

ghsa
#git#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-64178

Jellysweep uses uncontrolled data in image cache API endpoint

High severity GitHub Reviewed Published Nov 3, 2025 in jon4hz/jellysweep • Updated Nov 4, 2025

Package

gomod github.com/jon4hz/jellysweep (Go)

Affected versions

< 0.13.0

Impact

The /api/images/cache which is used to download media posters from the server accepted an url parameter, which was directly passed to the cache package and that downloaded the poster from this URL.
This URL parameter can be used to make the jellysweep server download arbitrary content.

The API endpoint can only be used by authenticated users.

Patches

Fixed in v0.13.0. The affected (and now fixed) library was also moved to internal/ because it wasn’t meant to be imported.

References

https://github.com/jon4hz/jellysweep/security/code-scanning/28

References

  • GHSA-xc93-q32j-cpcg
  • jon4hz/jellysweep@1746631

Published to the GitHub Advisory Database

Nov 4, 2025

ghsa: Latest News

GHSA-xc93-q32j-cpcg: Jellysweep uses uncontrolled data in image cache API endpoint