{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T04:03:25.439","vulnerabilities":[{"cve":{"id":"CVE-2026-25643","sourceIdentifier":"security-advisories@github.com","published":"2026-02-06T20:16:11.607","lastModified":"2026-02-11T19:00:39.877","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application does not sanitize user input in the video stream configuration (config.yaml), allowing direct injection of system commands via the exec: directive. The go2rtc service executes these commands without restrictions. This vulnerability is only exploitable by an administrator or users who have exposed their Frigate install to the open internet with no authentication which allows anyone full administrative control. This vulnerability is fixed in 0.16.4."},{"lang":"es","value":"Frigate es un grabador de video en red (NVR) con detección de objetos local en tiempo real para cámaras IP. Antes de la versión 0.16.4, se ha identificado una crítica vulnerabilidad de Ejecución Remota de Comandos (RCE) en la integración de Frigate con go2rtc. La aplicación no sanitiza la entrada del usuario en la configuración del flujo de video (config.yaml), permitiendo la inyección directa de comandos del sistema a través de la directiva exec:. El servicio go2rtc ejecuta estos comandos sin restricciones. Esta vulnerabilidad solo es explotable por un administrador o usuarios que han expuesto su instalación de Frigate a internet abierta sin autenticación, lo que permite a cualquiera un control administrativo total. Esta vulnerabilidad está corregida en la versión 0.16.4."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"},{"lang":"en","value":"CWE-250"},{"lang":"en","value":"CWE-269"},{"lang":"en","value":"CWE-668"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:frigate:frigate:*:*:*:*:*:*:*:*","versionEndExcluding":"0.16.4","matchCriteriaId":"AF9FEB51-0493-421E-9817-A5A88857FBD9"}]}]}],"references":[{"url":"https://github.com/blakeblackshear/frigate/releases/tag/v0.16.4","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/blakeblackshear/frigate/security/advisories/GHSA-4c97-5jmr-8f6x","source":"security-advisories@github.com","tags":["Vendor Advisory","Exploit"]},{"url":"https://github.com/blakeblackshear/frigate/security/advisories/GHSA-4c97-5jmr-8f6x","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Vendor Advisory","Exploit"]}]}}]}