๐Ÿ” CVE Alert

CVE-2026-31799

MEDIUM 4.9

Tautulli: SQL Injection in get_home_stats API endpoint via unsanitised filter parameters

CVSS Score
4.9
EPSS Score
0.0%
EPSS Percentile
0th

Tautulli is a Python based monitoring and tracking tool for Plex Media Server. From version 2.14.2 to before version 2.17.0 for parameters "before" and "after" and from version 2.1.0-beta to before version 2.17.0 for parameters "section_id" and "user_id", the /api/v2?cmd=get_home_stats endpoint passes the section_id, user_id, before, and after query parameters directly into SQL via Python %-string formatting without parameterization. An attacker who holds the Tautulli admin API key can inject arbitrary SQL and exfiltrate any value from the Tautulli SQLite database via boolean-blind inference. This issue has been patched in version 2.17.0.

CWE CWE-89 CWE-20
Vendor tautulli
Product tautulli
Published Mar 30, 2026
Last Updated Mar 30, 2026
Stay Ahead of the Next One

Get instant alerts for tautulli tautulli

Be the first to know when new medium vulnerabilities affecting tautulli tautulli are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

Tautulli / Tautulli
>= 2.1.0-beta, < 2.17.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/Tautulli/Tautulli/security/advisories/GHSA-g47q-8j8w-m63q github.com: https://github.com/Tautulli/Tautulli/releases/tag/v2.17.0