Path Traversal Vulnerability in Jellyfin Media Server
CVE-2026-35031

10CRITICAL

Key Information:

Vendor

Jellyfin

Status
Vendor
CVE Published:
14 April 2026

What is CVE-2026-35031?

Jellyfin, an open-source media server, has a vulnerability in the subtitle upload functionality that allows for path traversal through an unvalidated Format field. This flaw enables malicious actors to exploit arbitrary file writes, leading potentially to unauthorized access to system files, database information, and escalation of privileges. Exploitation requires an administrator account or a user with specific permissions. It is crucial for users to update to version 10.11.7, which addresses this vulnerability, or to limit subtitle upload permissions to mitigate risks.

Affected Version(s)

jellyfin < 10.11.7

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.