vulnerability
FreeBSD: VID-475d1968-f99d-11ef-b382-b0416f0c4c67 (CVE-2025-27154): Spotipy -- Spotipy's cache file, containing spotify auth token, is created with overly broad permissions
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Mar 5, 2025 | Mar 6, 2025 | Dec 10, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Mar 5, 2025
Added
Mar 6, 2025
Modified
Dec 10, 2025
Description
[email protected] reports: Spotipy is a lightweight Python library for the Spotify Web API. The `CacheHandler` class creates a cache file to store the auth token. Prior to version 2.25.1, the file created has `rw-r--r--` (644) permissions by default, when it could be locked down to `rw-------` (600) permissions. This leads to overly broad exposure of the spotify auth token. If this token can be read by an attacker (another user on the machine, or a process running as another user), it can be used to perform administrative actions on the Spotify account, depending on the scope granted to the token. Version 2.25.1 tightens the cache file permissions.
Solutions
freebsd-upgrade-package-py38-spotipyfreebsd-upgrade-package-py39-spotipyfreebsd-upgrade-package-py310-spotipyfreebsd-upgrade-package-py311-spotipy
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.