LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-31852

CVE-2026-31852 - Vulnerability Analysis

CriticalCVSS: 10.0

Last Updated: March 11, 2026

Jellyfin jellyfin-ios - Remote Code Execution

Published: March 11, 2026Updated: March 11, 2026Remote Exploitable

Overview

Jellyfin jellyfin-ios contains an arbitrary code execution vulnerability in the code-quality.yml GitHub Actions workflow due to elevated permissions, letting attackers via forked pull requests fully compromise the repository and organization, exploit requires pull request from forked repository.

Severity & Score

Severity: Critical
CVSS Score: 10.0
EPSS Score: 10.3%(Probability of exploitation in next 30 days)

Impact

Attackers can fully compromise the repository, exfiltrate secrets, poison packages, and compromise the entire organization.

Mitigation

No update required; end users do not need to take any actions as this is a workflow configuration issue.

Social Media Activity(1 post)

Taggart
Taggart
@mttaggart
Mar 16, 2026

This was a misconfiguration in Jellyfin's GitHub Actions. It has since been fixed. I'm kinda struggling to call this a "software vulnerability." Like...GitHub worked fine. The user (jellyfin) made insecure choices. This makes less sense than the rPi default credentials. https://nvd.nist.gov/vuln/detail/CVE-2026-31852

View original post

Details

CVE ID
CVE-2026-31852
Severity
Critical
CVSS Score
10.0
Type
undefined
Status
new
EPSS
10.3%
Social Posts
1

CWE

  • CWE-269

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS Score

10.3%Probability of exploitation in the next 30 days