Plex Media Server: Unpatched Access Vulnerabilities Remain

Security holes in Plex Media Server allow attackers to gain unauthorized access. Updates are pending.

listen Print view

(Image: Sashkin/Shutterstock.com)

2 min. read

In August, developers closed a security vulnerability in Plex Media Server. However, access security leaks reported shortly thereafter have apparently not yet been fixed. Users should therefore restrict access options as a precaution.

In vulnerability reports published over the weekend, developer Luis Finke points out that while the authentication vulnerability CVE-2025-34158 (CVSS 8.5, risk "high") was closed with version 1.42.1 of Plex Media Server in August. However, flanking security vulnerabilities in access token management remain open and pose a risk. They enable persistent unauthorized access, privilege escalation, and create problems when revoking compromised credentials.

The most serious issue is a vulnerability in Plex Media Server up to and including the current version 1.42.2.10156 from September, through which attackers can obtain a permanent access token by calling "/myplex/account" with a temporary access token (CVE-2025-69414, CVSS 8.5, risk "high"). A similar call, but with a device token, does not correctly check whether the device is linked to an account at all (CVE-2025-69415, CVSS 7.1, risk "high").

Two further security vulnerabilities affect the plex.tv backend up to and including the version from 31.12.2025. A non-server device token can intercept other tokens from "clients.plex.tv/devices.xml" intended for other accesses (CVE-2025-69416, CVSS 5.0, risk "medium"). The same can be achieved via a "shared_servers" API endpoint (CVE-2025-69417, CVSS 5.0, risk "medium").

Videos by heise

Since no updates are yet available to fix the partly high-risk security vulnerabilities, Plex users should restrict access to the server to trusted addresses.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.