CVE-2026-31852 - Vulnerability Analysis
CriticalCVSS: 10.0Last Updated: March 11, 2026
Jellyfin jellyfin-ios - Remote Code Execution
Overview
Jellyfin jellyfin-ios contains an arbitrary code execution vulnerability in the code-quality.yml GitHub Actions workflow due to elevated permissions, letting attackers via forked pull requests fully compromise the repository and organization, exploit requires pull request from forked repository.
Severity & Score
Impact
Attackers can fully compromise the repository, exfiltrate secrets, poison packages, and compromise the entire organization.
Mitigation
No update required; end users do not need to take any actions as this is a workflow configuration issue.
References
Social Media Activity(1 post)
This was a misconfiguration in Jellyfin's GitHub Actions. It has since been fixed. I'm kinda struggling to call this a "software vulnerability." Like...GitHub worked fine. The user (jellyfin) made insecure choices. This makes less sense than the rPi default credentials. https://nvd.nist.gov/vuln/detail/CVE-2026-31852
View original postRelated Resources
Details
- CVE ID
- CVE-2026-31852
- Severity
- Critical
- CVSS Score
- 10.0
- Type
- undefined
- Status
- new
- EPSS
- 10.3%
- Social Posts
- 1
CWE
- CWE-269
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H