CVE-2021-21402

Unauthenticated Arbitrary File Access in Jellyfin

Basic Information

CVE State
PUBLISHED
Reserved Date
December 22, 2020
Published Date
March 23, 2021
Last Updated
August 03, 2024
Vendor
jellyfin
Product
jellyfin
Description
Jellyfin is a Free Software Media System. In Jellyfin before version 10.7.1, with certain endpoints, well crafted requests will allow arbitrary file read from a Jellyfin server's file system. This issue is more prevalent when Windows is used as the host OS. Servers that are exposed to the public Internet are potentially at risk. This is fixed in version 10.7.1. As a workaround, users may be able to restrict some access by enforcing strict security permissions on their filesystem, however, it is recommended to update as soon as possible.
Tags
windows nuclei_scanner

CVSS Scores

CVSS v3.1

7.7 - HIGH

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

EPSS Score

Score
92.33% (Percentile: 99.71%) as of 2025-06-05

Exploit Status

Exploited in the Wild
Yes (2025-05-08 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-05-08 00:00:00 UTC

Scanner Integrations

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel