ampache CVE Vulnerabilities & Metrics

Focus on ampache vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About ampache Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with ampache. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total ampache CVEs: 21
Earliest CVE date: 03 Nov 2006, 01:07 UTC
Latest CVE date: 11 Nov 2024, 20:15 UTC

Latest CVE reference: CVE-2024-51490

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 12

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical ampache CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.43

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 17
4.0-6.9 5
7.0-8.9 3
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS ampache CVEs

These are the five CVEs with the highest CVSS scores for ampache, sorted by severity first and recency.

All CVEs for ampache

CVE-2024-51490 ampache vulnerability CVSS: 0 11 Nov 2024, 20:15 UTC

Ampache is a web based audio/video streaming application and file manager. This vulnerability exists in the interface section of the Ampache menu, where users can change "Custom URL - Logo". This section is not properly sanitized, allowing for the input of strings that can execute JavaScript. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-51489 ampache vulnerability CVSS: 0 11 Nov 2024, 20:15 UTC

Ampache is a web based audio/video streaming application and file manager. The current implementation of token parsing does not adequately validate CSRF tokens when users send messages to one another. This vulnerability could be exploited to forge CSRF attacks, allowing an attacker to send messages to any user, including administrators, if they interact with a malicious request. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-51488 ampache vulnerability CVSS: 0 11 Nov 2024, 20:15 UTC

Ampache is a web based audio/video streaming application and file manager. The current implementation of token parsing does not adequately validate CSRF tokens when users delete messages. This vulnerability could be exploited to forge CSRF attacks, allowing an attacker to delete messages to any user, including administrators, if they interact with a malicious request. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-51487 ampache vulnerability CVSS: 0 11 Nov 2024, 20:15 UTC

Ampache is a web based audio/video streaming application and file manager. The current implementation of token parsing fails to properly validate CSRF tokens when activating or deactivating catalog. This vulnerability allows an attacker to exploit CSRF attacks, potentially enabling them to change website features that should only be managed by administrators through malicious requests. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-51486 ampache vulnerability CVSS: 0 11 Nov 2024, 20:15 UTC

Ampache is a web based audio/video streaming application and file manager. The vulnerability exists in the interface section of the Ampache menu, where users can change the "Custom URL?-?Favicon". This section is not properly sanitized, allowing for the input of strings that can execute JavaScript. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-51485 ampache vulnerability CVSS: 0 11 Nov 2024, 20:15 UTC

Ampache is a web based audio/video streaming application and file manager. The current implementation of token parsing fails to properly validate CSRF tokens when activating or deactivating plugins. This vulnerability allows an attacker to exploit CSRF attacks, potentially enabling them to change website features that should only be managed by administrators through malicious requests. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-51484 ampache vulnerability CVSS: 0 11 Nov 2024, 20:15 UTC

Ampache is a web based audio/video streaming application and file manager. The current implementation of token parsing fails to properly validate CSRF tokens when activating or deactivating controllers. This vulnerability allows an attacker to exploit CSRF attacks, potentially enabling them to change website features that should only be managed by administrators through malicious requests. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-47828 ampache vulnerability CVSS: 0 09 Oct 2024, 19:15 UTC

ampache is a web based audio/video streaming application and file manager. A CSRF attack can be performed in order to delete objects (Playlist, smartlist etc.). Cross-Site Request Forgery (CSRF) is an attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated. This vulnerability can be exploited by creating a malicious script with an arbitrary playlist ID belonging to another user. When the user submits the request, their playlist will be deleted. Any User with active sessions who are tricked into submitting a malicious request are impacted, as their playlists or other objects could be deleted without their consent.

CVE-2024-47184 ampache vulnerability CVSS: 0 27 Sep 2024, 14:15 UTC

Ampache is a web based audio/video streaming application and file manager. Prior to version 6.6.0, the Democratic Playlist Name is vulnerable to a stored cross-site scripting. Version 6.6.0 fixes this issue.

CVE-2024-41665 ampache vulnerability CVSS: 0 23 Jul 2024, 18:15 UTC

Ampache, a web based audio/video streaming application and file manager, has a stored cross-site scripting (XSS) vulnerability in versions prior to 6.6.0. This vulnerability exists in the "Playlists - Democratic - Configure Democratic Playlist" feature. An attacker with Content Manager permissions can set the Name field to `<svg onload=alert(8)>`. When any administrator or user accesses the Democratic functionality, they will be affected by this stored XSS vulnerability. The attacker can exploit this vulnerability to obtain the cookies of any user or administrator who accesses the `democratic.php` file. Version 6.6.0 contains a patch for the issue.

CVE-2024-28853 ampache vulnerability CVSS: 0 27 Mar 2024, 14:15 UTC

Ampache is a web based audio/video streaming application and file manager. Stored Cross Site Scripting (XSS) vulnerability in ampache before v6.3.1 allows a remote attacker to execute code via a crafted payload to serval parameters in the post request of /preferences.php?action=admin_update_preferences. This vulnerability is fixed in 6.3.1.

CVE-2024-28852 ampache vulnerability CVSS: 0 27 Mar 2024, 14:15 UTC

Ampache is a web based audio/video streaming application and file manager. Ampache has multiple reflective XSS vulnerabilities,this means that all forms in the Ampache that use `rule` as a variable are not secure. For example, when querying a song, when querying a podcast, we need to use `$rule` variable. This vulnerability is fixed in 6.3.1

CVE-2023-0771 ampache vulnerability CVSS: 0 10 Feb 2023, 01:15 UTC

SQL Injection in GitHub repository ampache/ampache prior to 5.5.7,develop.

CVE-2023-0606 ampache vulnerability CVSS: 0 01 Feb 2023, 01:15 UTC

Cross-site Scripting (XSS) - Reflected in GitHub repository ampache/ampache prior to 5.5.7.

CVE-2022-4665 ampache vulnerability CVSS: 0 23 Dec 2022, 01:15 UTC

Unrestricted Upload of File with Dangerous Type in GitHub repository ampache/ampache prior to 5.5.6.

CVE-2021-32644 ampache vulnerability CVSS: 3.5 22 Jun 2021, 18:15 UTC

Ampache is an open source web based audio/video streaming application and file manager. Due to a lack of input filtering versions 4.x.y are vulnerable to code injection in random.php. The attack requires user authentication to access the random.php page unless the site is running in demo mode. This issue has been resolved in 4.4.3.

CVE-2020-15153 ampache vulnerability CVSS: 7.5 30 Apr 2021, 16:15 UTC

Ampache before version 4.2.2 allows unauthenticated users to perform SQL injection. Refer to the referenced GitHub Security Advisory for details and a workaround. This is fixed in version 4.2.2 and the development branch.

CVE-2021-21399 ampache vulnerability CVSS: 5.0 13 Apr 2021, 20:15 UTC

Ampache is a web based audio/video streaming application and file manager. Versions prior to 4.4.1 allow unauthenticated access to Ampache using the subsonic API. To successfully make the attack you must use a username that is not part of the site to bypass the auth checks. For more details and workaround guidance see the referenced GitHub security advisory.

CVE-2019-12386 ampache vulnerability CVSS: 3.5 22 Aug 2019, 19:15 UTC

An issue was discovered in Ampache through 3.9.1. A stored XSS exists in the localplay.php LocalPlay "add instance" functionality. The injected code is reflected in the instances menu. This vulnerability can be abused to force an admin to create a new privileged user whose credentials are known by the attacker.

CVE-2019-12385 ampache vulnerability CVSS: 6.5 22 Aug 2019, 19:15 UTC

An issue was discovered in Ampache through 3.9.1. The search engine is affected by a SQL Injection, so any user able to perform lib/class/search.class.php searches (even guest users) can dump any data contained in the database (sessions, hashed passwords, etc.). This may lead to a full compromise of admin accounts, when combined with the weak password generator algorithm used in the lostpassword functionality.

CVE-2017-18375 ampache vulnerability CVSS: 6.5 24 May 2019, 18:29 UTC

Ampache 3.8.3 allows PHP Object Instantiation via democratic.ajax.php and democratic.class.php.

CVE-2008-3929 ampache vulnerability CVSS: 7.2 04 Sep 2008, 18:41 UTC

gather-messages.sh in Ampache 3.4.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/filelist temporary file.

CVE-2007-4437 ampache vulnerability CVSS: 6.8 20 Aug 2007, 22:17 UTC

SQL injection vulnerability in albums.php in Ampache before 3.3.3.5 allows remote attackers to execute arbitrary SQL commands via the match parameter. NOTE: some details are obtained from third party information.

CVE-2007-4438 ampache vulnerability CVSS: 6.8 20 Aug 2007, 22:17 UTC

Session fixation vulnerability in Ampache before 3.3.3.5 allows remote attackers to hijack web sessions via unspecified vectors.

CVE-2006-5668 ampache vulnerability CVSS: 7.5 03 Nov 2006, 01:07 UTC

Unspecified vulnerability in Ampache 3.3.2 and earlier, when register_globals is enabled, allows remote attackers to bypass security restrictions and gain guest access.