Vulnerability Description
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. In version 0.17.0, a low-privilege authenticated user restricted to one camera can access snapshots from other cameras. This is possible through a chain of two authorization problems: `/api/timeline` returns timeline entries for cameras outside the caller's allowed camera set, then `/api/events/{event_id}/snapshot-clean.webp` declares `Depends(require_camera_access)` but never actually validates `event.camera` after looking up the event. Together, this allows a restricted user to enumerate event IDs from unauthorized cameras and then fetch clean snapshots for those events. Version 0.17.1 fixes the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Frigate | Frigate | 0.17.0 |
Related Weaknesses (CWE)
References
- https://github.com/blakeblackshear/frigate/security/advisories/GHSA-m2mg-pj9p-2rExploitMitigationVendor Advisory
- https://github.com/blakeblackshear/frigate/security/advisories/GHSA-m2mg-pj9p-2rExploitMitigationVendor Advisory
FAQ
What is CVE-2026-33470?
CVE-2026-33470 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. In version 0.17.0, a low-privilege authenticated user restricted to one camera can access snapshots from ...
How severe is CVE-2026-33470?
CVE-2026-33470 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33470?
Check the references section above for vendor advisories and patch information. Affected products include: Frigate Frigate.