CVE-2025-64113

Emby Server is a user-installable home media server. Versions below 4.9.1.81 allow an attacker to gain full administrative access to an Emby Server (for Emby Server administration, not at the OS level). Other than network access, no specific preconditions need to be fulfilled for a server to be vulnerable. This issue is fixed in version 4.9.1.81.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:emby:emby:*:*:*:*:*:*:*:*
cpe:2.3:a:emby:emby:4.9.2.6:beta:*:*:*:*:*:*

History

24 Feb 2026, 19:58

Type Values Removed Values Added
CPE cpe:2.3:a:emby:emby:4.9.2.6:beta:*:*:*:*:*:*
cpe:2.3:a:emby:emby:*:*:*:*:*:*:*:*
References () https://github.com/EmbySupport/Emby.Security/security/advisories/GHSA-95fv-5gfj-2r84 - () https://github.com/EmbySupport/Emby.Security/security/advisories/GHSA-95fv-5gfj-2r84 - Vendor Advisory, Mitigation
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Emby emby
Emby

09 Dec 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-09 20:15

Updated : 2026-02-24 19:58


NVD link : CVE-2025-64113

Mitre link : CVE-2025-64113

CVE.ORG link : CVE-2025-64113


JSON object : View

Products Affected

emby

  • emby
CWE
CWE-640

Weak Password Recovery Mechanism for Forgotten Password