๐Ÿ” CVE Alert

CVE-2026-35031

CRITICAL 10.0

Jellyfin: Potential RCE via subtitle upload path traversal + .strm chain

CVSS Score
10.0
EPSS Score
0.2%
EPSS Percentile
48th

Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the subtitle upload endpoint (POST /Videos/{itemId}/Subtitles), where the Format field is not validated, allowing path traversal via the file extension and enabling arbitrary file write. This arbitrary file write can be chained into arbitrary file read via .strm files, database extraction, admin privilege escalation, and ultimately remote code execution as root via ld.so.preload. Exploitation requires an administrator account or a user that has been explicitly granted the "Upload Subtitles" permission. This issue has been fixed in version 10.11.7. If users are unable to upgrade immediately, they can grant non-administrator users Subtitle upload permissions to reduce attack surface.

CWE CWE-20 CWE-22 CWE-187
Vendor jellyfin
Product jellyfin
Published Apr 14, 2026
Last Updated Apr 16, 2026
Stay Ahead of the Next One

Get instant alerts for jellyfin jellyfin

Be the first to know when new critical vulnerabilities affecting jellyfin jellyfin are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

jellyfin / jellyfin
< 10.11.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/jellyfin/jellyfin/security/advisories/GHSA-j2hf-x4q5-47j3 github.com: https://github.com/jellyfin/jellyfin/releases/tag/v10.11.7