Emby Server is a user-installable home media server. Versions below 4.9.1.81 allow an attacker to gain full administrative access to an Emby Server (for Emby Server administration, not at the OS level). Other than network access, no specific preconditions need to be fulfilled for a server to be vulnerable. This issue is fixed in version 4.9.1.81.
References
| Link | Resource |
|---|---|
| https://github.com/EmbySupport/Emby.Security/security/advisories/GHSA-95fv-5gfj-2r84 | Vendor Advisory Mitigation |
Configurations
Configuration 1 (hide)
|
History
24 Feb 2026, 19:58
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:emby:emby:4.9.2.6:beta:*:*:*:*:*:* cpe:2.3:a:emby:emby:*:*:*:*:*:*:*:* |
|
| References | () https://github.com/EmbySupport/Emby.Security/security/advisories/GHSA-95fv-5gfj-2r84 - Vendor Advisory, Mitigation | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| First Time |
Emby emby
Emby |
09 Dec 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 20:15
Updated : 2026-02-24 19:58
NVD link : CVE-2025-64113
Mitre link : CVE-2025-64113
CVE.ORG link : CVE-2025-64113
JSON object : View
Products Affected
emby
- emby
CWE
CWE-640
Weak Password Recovery Mechanism for Forgotten Password
