Headline
GHSA-xc93-q32j-cpcg: Jellysweep uses uncontrolled data in image cache API endpoint
Impact
The /api/images/cache which is used to download media posters from the server accepted an url parameter, which was directly passed to the cache package and that downloaded the poster from this URL.
This URL parameter can be used to make the jellysweep server download arbitrary content.
The API endpoint can only be used by authenticated users.
Patches
Fixed in v0.13.0. The affected (and now fixed) library was also moved to internal/ because it wasn’t meant to be imported.
References
https://github.com/jon4hz/jellysweep/security/code-scanning/28
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-64178
Jellysweep uses uncontrolled data in image cache API endpoint
High severity GitHub Reviewed Published Nov 3, 2025 in jon4hz/jellysweep • Updated Nov 4, 2025
Package
gomod github.com/jon4hz/jellysweep (Go)
Affected versions
< 0.13.0
Impact
The /api/images/cache which is used to download media posters from the server accepted an url parameter, which was directly passed to the cache package and that downloaded the poster from this URL.
This URL parameter can be used to make the jellysweep server download arbitrary content.
The API endpoint can only be used by authenticated users.
Patches
Fixed in v0.13.0. The affected (and now fixed) library was also moved to internal/ because it wasn’t meant to be imported.
References
https://github.com/jon4hz/jellysweep/security/code-scanning/28
References
- GHSA-xc93-q32j-cpcg
- jon4hz/jellysweep@1746631
Published to the GitHub Advisory Database
Nov 4, 2025