CVE-2023-30626

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-30626
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-30626.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-30626
Aliases
Related
Published
2023-04-24T20:06:39Z
Modified
2025-10-15T02:23:24.548755Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Jellyfin vulnerable to directory traversal and file write causing arbitrary code execution
Details

Jellyfin is a free-software media system. Versions starting with 10.8.0 and prior to 10.8.10 and prior have a directory traversal vulnerability inside the ClientLogController, specifically /ClientLog/Document. When combined with a cross-site scripting vulnerability (CVE-2023-30627), this can result in file write and arbitrary code execution. Version 10.8.10 has a patch for this issue. There are no known workarounds.

References

Affected packages

Git / github.com/jellyfin/jellyfin-web

Affected ranges

Type
GIT
Repo
https://github.com/jellyfin/jellyfin-web
Events

Affected versions

v10.*

v10.8.0
v10.8.1
v10.8.2
v10.8.3
v10.8.4
v10.8.5
v10.8.6
v10.8.7
v10.8.8
v10.8.9