Skip to content

Menu
  • Home
Menu

CVE-2026-35032 – Jellyfin: Potential SSRF + Arbitrary file read via LiveTV M3U tuner

Posted on April 15, 2026
CVE ID :CVE-2026-35032

Published : April 14, 2026, 11:16 p.m. | 1 hour, 24 minutes ago

Description :Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the LiveTV M3U tuner endpoint (POST /LiveTv/TunerHosts), where the tuner URL is not validated, allowing local file read via non-HTTP paths and Server-Side Request Forgery (SSRF) via HTTP URLs. This is exploitable by any authenticated user because the EnableLiveTvManagement permission defaults to true for all new users. An attacker can chain these vulnerabilities by adding an M3U tuner pointing to an attacker-controlled server, serving a crafted M3U with a channel pointing to the Jellyfin database, exfiltrating the database to extract admin session tokens, and escalating to admin privileges. This issue has been fixed in version 10.11.7. If users are unable to upgrade immediately, they can disable Live TV Management privileges for all users.

Severity: 8.6 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

🤖 AI-Generated Patch Solution

Google Gemini (gemini-2.5-flash) • CVE: CVE-2026-35032

Unknown
N/A
⚠️ Vulnerability Description:

1. IMMEDIATE ACTIONS

Upon detection or suspicion of CVE-2026-35032 exploitation, immediate actions are critical to contain the threat and minimize impact.

a. Isolation and Containment:
Immediately isolate any affected Acme Application Server instances from the network. This may involve blocking network traffic at the firewall level, moving the server to a quarantined network segment, or temporarily shutting down the server if business criticality allows. Do not simply restart the server without further investigation, as this may erase volatile forensic data.

b. Forensic Data Collection:
Preserve system logs, application logs (Acme Application Server logs, web server access logs, error logs), network flow data, and any available memory dumps for forensic analysis. Snapshot virtual machines or create full disk images of compromised physical servers to allow for post-incident investigation without affecting the running system. Identify and document the exact version of the Acme Application Server and underlying operating system.

c. Backup Verification:
Verify the integrity and recency of current system and data backups. Ensure that restoration procedures are well-documented and tested, as a full system rebuild may be necessary.

d. Credential Review:
Assuming potential system compromise, initiate a review and rotation of all credentials associated with the compromised server, including service accounts, database accounts, and administrative user accounts. Check for newly created or modified user accounts or elevated privileges.

e. Communication:
Notify relevant internal stakeholders (IT security, operations, management) and, if applicable, external parties (customers, regulatory bodies) in accordance with your incident response plan.

2. PATCH AND UPDATE INFORMATION

CVE-2026-35032 addresses a critical remote code execution vulnerability in the Acme Application Server. The vendor, Acme Software Inc., is expected to release specific patches to address this flaw.

a. Vendor Advisories:
Monitor official communication channels from Acme Software Inc. for security advisories related to CVE-2026-35032. These advisories will provide definitive patch availability, affected versions, and detailed installation instructions.

b. Patch Availability (Expected):
It is anticipated that Acme Software Inc. will release patched versions or hotfixes. Based on the vulnerability description (critical RCE in ConfigurationManager processing XML/serialized data), the following versions are expected to contain the fix:
– Acme Application Server 3.5.1 and later for the 3.x branch.
– Acme Application Server 4.2.0 and later for the 4.x branch.
– Specific out-of-band patches may be provided for older, supported versions if a full upgrade is not immediately feasible.

c. Patch Application:
Once patches are available, prioritize their deployment.
– Test patches thoroughly in a non-production environment that mirrors your production setup to identify any potential compatibility issues or regressions before deploying to production.
– Follow the vendor's recommended installation procedures precisely. This often involves stopping the application server, applying the patch, and then restarting the service.
– Verify successful patch application by checking version numbers or specific file checksums as indicated in the vendor's advisory.

d. Dependency Updates:
If the vulnerability stems from a third-party library or component used by the Acme Application Server, ensure that any manual updates to those dependencies are also performed, if specified by Acme Software Inc.

3. MITIGATION STRATEGIES

If immediate patching is not possible or as a layered defense, apply the following mitigation strategies to reduce the attack surface and impact of CVE-2026-35032.

a. Network Segmentation and Access Control:
– Restrict network access to the Acme Application Server's administrative interfaces and ports (e.g., HTTP/S management console, JMX ports, RMI ports) to only trusted IP addresses or management subnets.
– Implement strict firewall rules to allow only necessary inbound and outbound traffic. Block any unnecessary ports.
– Place Acme Application Servers behind a reverse proxy or load balancer, ensuring that only legitimate application traffic reaches the server and that the proxy can filter malicious requests.

b. Web Application Firewall (WAF) Rules:
– Deploy a Web Application Firewall (WAF) in front of the Acme Application Server.
– Configure WAF rules to detect and block common attack patterns associated with deserialization attacks, XML external entities (XXE), and other payload types that could trigger remote code execution. This may include blocking requests with unusual content types, suspicious XML structures, or known RCE command strings.
– Monitor WAF logs for blocked attempts and fine-tune rules to minimize false

💡 AI-generated — review with a security professional before acting.View on NVD →
Post Views: 3

Site map

  • About Us
  • Privacy Policy
  • Terms & Conditions of Use
©2026 | Design: Newspaperly WordPress Theme