Path Traversal Vulnerability in Jellystat Statistics App for Jellyfin
CVE-2025-24960

8.7HIGH

Key Information:

Vendor
Cyfershepard
Status
Jellystat
Vendor
CVE Published:
3 February 2025

Summary

The Jellystat Statistics App for Jellyfin has a path traversal vulnerability that allows unauthorized access to system files through user input in administrative routes. Specifically, the affected versions enable the use of the DELETE command on any specified file, posing a significant risk to system integrity. This issue is primarily restricted to administrative functions, yet it still warrants immediate attention. Users should upgrade to version 1.1.3 to mitigate this vulnerability, as there are no known workarounds available.

Affected Version(s)

Jellystat < 1.1.3

References

CVSS V3.1

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.