Untriaged
Permalink
CVE-2026-33126
5.0 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): LOW
- Availability impact (A): NONE
Frigate has SSRF vulnerability in /ffprobe endpoint
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to version 0.16.3, the /ffprobe endpoint accepts arbitrary user-controlled URLs without proper validation, allowing Server-Side Request Forgery (SSRF) attacks. An attacker can use the Frigate server to make HTTP requests to internal network resources, cloud metadata services, or perform port scanning. This issue has been patched in version 0.16.3.
References
- https://github.com/blakeblackshear/frigate/security/advisories/GHSA-j6g3-3j3q-c2xv x_refsource_CONFIRM
- https://github.com/blakeblackshear/frigate/releases/tag/v0.16.3 x_refsource_MISC
Affected products
frigate
- ==< 0.16.3
Matching in nixpkgs
pkgs.frigate
NVR with realtime local object detection for IP cameras
pkgs.pkgsRocm.frigate
NVR with realtime local object detection for IP cameras
Package maintainers
-
@mweinelt Martin Weinelt <hexa@darmstadt.ccc.de>
-
@presto8 Preston Hunt <me@prestonhunt.com>