CVE-2026-25643

Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application does not sanitize user input in the video stream configuration (config.yaml), allowing direct injection of system commands via the exec: directive. The go2rtc service executes these commands without restrictions. This vulnerability is only exploitable by an administrator or users who have exposed their Frigate install to the open internet with no authentication which allows anyone full administrative control. This vulnerability is fixed in 0.16.4.
Configurations

No configuration.

History

06 Feb 2026, 21:16

Type Values Removed Values Added
References () https://github.com/blakeblackshear/frigate/security/advisories/GHSA-4c97-5jmr-8f6x - () https://github.com/blakeblackshear/frigate/security/advisories/GHSA-4c97-5jmr-8f6x -

06 Feb 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 20:16

Updated : 2026-02-06 21:57


NVD link : CVE-2026-25643

Mitre link : CVE-2026-25643

CVE.ORG link : CVE-2026-25643


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-250

Execution with Unnecessary Privileges

CWE-269

Improper Privilege Management

CWE-668

Exposure of Resource to Wrong Sphere