SQL Injection Vulnerability in Jellystat for Jellyfin
CVE-2026-41167

9.1CRITICAL

Key Information:

Status
Vendor
CVE Published:
22 April 2026

What is CVE-2026-41167?

Jellystat, the open-source statistics application for Jellyfin, is susceptible to SQL injection due to improper handling of user inputs in various API endpoints. This vulnerability allows authenticated users to manipulate SQL queries by sending unsanitized request-body fields, particularly targeting endpoints like 'POST /api/getUserDetails' and 'POST /api/getLibrary'. By exploiting this flaw, attackers can read sensitive database tables, including configurations that contain admin credentials and API keys. Additionally, the flaw enables executing arbitrary commands on the PostgreSQL host, especially given that the deployment uses PostgreSQL superuser roles. The issue has been addressed in version 1.1.10.

Affected Version(s)

Jellystat < 1.1.10

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.