Description
Audiobookshelf is a self-hosted audiobook and podcast server. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 0.12.0-beta of the Audiobookshelf mobile application that allows arbitrary JavaScript execution through malicious library metadata. Attackers with library modification privileges can execute code in victim users' browsers/WebViews, potentially leading to session hijacking, data exfiltration, and unauthorized access to native device APIs. The issue is fixed in audiobookshelf-app version 0.12.0-beta, corresponding to audiobookshelf version 2.12.0.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/advplyr/audiobookshelf/security/advisories/GHSA-2433-p93m-xhhg
Scores
CVSS v3
4.0
EPSS
0.0005
EPSS Percentile
14.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
audiobookshelf/audiobookshelf
< 2.12.0
audiobookshelf/audiobookshelf_mobile_app
< 0.12.0
Published
Feb 26, 2026
Tracked Since
Feb 26, 2026