Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: jellyfin

Found 4 matching suggestions

View:
Compact
Detailed
Published
Permalink CVE-2026-35034
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 21 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored reference https://g…
  • @LeSuisse ignored
    19 packages
    • jellyfin-rpc
    • jellyfin-tui
    • jellyfin-web
    • jellyfin-ffmpeg
    • mopidy-jellyfin
    • jellyfin-desktop
    • jellyfin-mpv-shim
    • jellyfin-media-player
    • kodiPackages.jellyfin
    • python312Packages.aiojellyfin
    • python313Packages.aiojellyfin
    • python314Packages.aiojellyfin
    • mopidyPackages.mopidy-jellyfin
    • home-assistant-component-tests.jellyfin
    • tests.home-assistant-components.jellyfin
    • python312Packages.jellyfin-apiclient-python
    • python313Packages.jellyfin-apiclient-python
    • python314Packages.jellyfin-apiclient-python
    • tests.home-assistant-component-tests.jellyfin
  • @LeSuisse ignored
    4 maintainers
    • @purcell
    • @nyanloutre
    • @jojosch
    • @minijackson
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Jellyfin: Potential Application DoS from excessively large SyncPlay group names

Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a denial of service vulnerability in the SyncPlay group creation endpoint (POST /SyncPlay/New), where an authenticated user can create groups with names of unlimited size due to insufficient input validation. By sending large payloads combined with arbitrary group IDs, an attacker can lock out the endpoint for other clients attempting to join SyncPlay groups and significantly increase the memory usage of the Jellyfin process, potentially leading to an out-of-memory crash. This issue has been fixed in version 10.11.7.

Affected products

jellyfin
  • ==< 10.11.7

Matching in nixpkgs

Ignored packages (19)

pkgs.jellyfin-rpc

Displays the content you're currently watching on Discord

Package maintainers

Ignored maintainers (4)
Published
Permalink CVE-2026-35031
10.0 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 21 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored reference https://g…
  • @LeSuisse ignored
    19 packages
    • jellyfin-rpc
    • jellyfin-tui
    • jellyfin-web
    • jellyfin-ffmpeg
    • mopidy-jellyfin
    • jellyfin-desktop
    • jellyfin-mpv-shim
    • jellyfin-media-player
    • kodiPackages.jellyfin
    • python312Packages.aiojellyfin
    • python313Packages.aiojellyfin
    • python314Packages.aiojellyfin
    • mopidyPackages.mopidy-jellyfin
    • home-assistant-component-tests.jellyfin
    • tests.home-assistant-components.jellyfin
    • python312Packages.jellyfin-apiclient-python
    • python313Packages.jellyfin-apiclient-python
    • python314Packages.jellyfin-apiclient-python
    • tests.home-assistant-component-tests.jellyfin
  • @LeSuisse ignored
    4 maintainers
    • @jojosch
    • @nyanloutre
    • @minijackson
    • @purcell
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Jellyfin: Potential RCE via subtitle upload path traversal + .strm chain

Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the subtitle upload endpoint (POST /Videos/{itemId}/Subtitles), where the Format field is not validated, allowing path traversal via the file extension and enabling arbitrary file write. This arbitrary file write can be chained into arbitrary file read via .strm files, database extraction, admin privilege escalation, and ultimately remote code execution as root via ld.so.preload. Exploitation requires an administrator account or a user that has been explicitly granted the "Upload Subtitles" permission. This issue has been fixed in version 10.11.7. If users are unable to upgrade immediately, they can grant non-administrator users Subtitle upload permissions to reduce attack surface.

Affected products

jellyfin
  • ==< 10.11.7

Matching in nixpkgs

Ignored packages (19)

pkgs.jellyfin-rpc

Displays the content you're currently watching on Discord

Package maintainers

Ignored maintainers (4)
Published
updated 21 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored reference https://g…
  • @LeSuisse ignored
    19 packages
    • jellyfin-rpc
    • jellyfin-tui
    • jellyfin-web
    • jellyfin-ffmpeg
    • mopidy-jellyfin
    • jellyfin-desktop
    • jellyfin-mpv-shim
    • jellyfin-media-player
    • kodiPackages.jellyfin
    • python312Packages.aiojellyfin
    • python313Packages.aiojellyfin
    • python314Packages.aiojellyfin
    • mopidyPackages.mopidy-jellyfin
    • home-assistant-component-tests.jellyfin
    • tests.home-assistant-components.jellyfin
    • python312Packages.jellyfin-apiclient-python
    • python313Packages.jellyfin-apiclient-python
    • python314Packages.jellyfin-apiclient-python
    • tests.home-assistant-component-tests.jellyfin
  • @LeSuisse ignored
    4 maintainers
    • @jojosch
    • @nyanloutre
    • @minijackson
    • @purcell
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Jellyfin: Potential SSRF + Arbitrary file read via stream argument injection

Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain an unauthenticated arbitrary file read vulnerability via ffmpeg argument injection through the StreamOptions query parameter parsing mechanism. The ParseStreamOptions method in StreamingHelpers.cs adds any lowercase query parameter to a dictionary without validation, bypassing the RegularExpression attribute on the level controller parameter, and the unsanitized value is concatenated directly into the ffmpeg command line. By injecting a drawtext filter with a textfile argument, an attacker can read arbitrary server files such as /etc/shadow and exfiltrate their contents as text rendered in the video stream response. The vulnerable /Videos/{itemId}/stream endpoint has no Authorize attribute, making this exploitable without authentication, though item GUIDs are pseudorandom and require an authenticated user to obtain. This issue has been fixed in version 10.11.7.

Affected products

jellyfin
  • ==< 10.11.7

Matching in nixpkgs

Ignored packages (19)

pkgs.jellyfin-rpc

Displays the content you're currently watching on Discord

Package maintainers

Ignored maintainers (4)
Published
updated 21 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    19 packages
    • jellyfin-rpc
    • jellyfin-tui
    • jellyfin-web
    • jellyfin-ffmpeg
    • mopidy-jellyfin
    • jellyfin-desktop
    • jellyfin-mpv-shim
    • jellyfin-media-player
    • kodiPackages.jellyfin
    • python312Packages.aiojellyfin
    • python313Packages.aiojellyfin
    • python314Packages.aiojellyfin
    • mopidyPackages.mopidy-jellyfin
    • home-assistant-component-tests.jellyfin
    • tests.home-assistant-components.jellyfin
    • python312Packages.jellyfin-apiclient-python
    • python313Packages.jellyfin-apiclient-python
    • python314Packages.jellyfin-apiclient-python
    • tests.home-assistant-component-tests.jellyfin
  • @LeSuisse ignored reference https://g…
  • @LeSuisse ignored
    4 maintainers
    • @jojosch
    • @minijackson
    • @nyanloutre
    • @purcell
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Jellyfin: Potential SSRF + Arbitrary file read via LiveTV M3U tuner

Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the LiveTV M3U tuner endpoint (POST /LiveTv/TunerHosts), where the tuner URL is not validated, allowing local file read via non-HTTP paths and Server-Side Request Forgery (SSRF) via HTTP URLs. This is exploitable by any authenticated user because the EnableLiveTvManagement permission defaults to true for all new users. An attacker can chain these vulnerabilities by adding an M3U tuner pointing to an attacker-controlled server, serving a crafted M3U with a channel pointing to the Jellyfin database, exfiltrating the database to extract admin session tokens, and escalating to admin privileges. This issue has been fixed in version 10.11.7. If users are unable to upgrade immediately, they can disable Live TV Management privileges for all users.

Affected products

jellyfin
  • ==< 10.11.7

Matching in nixpkgs

Ignored packages (19)

pkgs.jellyfin-rpc

Displays the content you're currently watching on Discord

Package maintainers

Ignored maintainers (4)