PT-2026-32958 · Jellyfin · Jellyfin

Paul-Gerste-Sonarsource

·

Published

2026-04-14

·

Updated

2026-04-15

·

CVE-2026-35033

CVSS v4.0

9.3

Critical

AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N
Name of the Vulnerable Software and Affected Versions Jellyfin versions prior to 10.11.7
Description An unauthenticated arbitrary file read is possible via ffmpeg argument injection through the query parameter parsing mechanism. The ParseStreamOptions method in StreamingHelpers.cs adds lowercase query parameters to a dictionary without validation, bypassing the RegularExpression attribute on the level controller parameter. This unsanitized value is then concatenated directly into the ffmpeg command line. An attacker can inject a drawtext filter with a textfile argument to read arbitrary server files, such as /etc/shadow, and exfiltrate the contents as text rendered in the video stream response. The affected endpoint is '/Videos/{itemId}/stream', which lacks an Authorize attribute, allowing exploitation without authentication, although item GUIDs are pseudorandom.
Recommendations Update to version 10.11.7.

Fix

Argument Injection

Missing Authorization

Weakness Enumeration

Related Identifiers

CVE-2026-35033

Affected Products

Jellyfin