Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2139 articles · 105967 vulns · 36/41 feeds (7d)
← Back to list
4.0
CVE-2026-31804EXPLOITEDPATCHED
null · tautulli

Tautulli: Unauthenticated pms_image_proxy endpoint proxies arbitrary HTTP requests through the Plex Media Server

Description

Tautulli is a Python based monitoring and tracking tool for Plex Media Server. Prior to version 2.17.0, the /pms_image_proxy endpoint accepts a user-supplied img parameter and forwards it to Plex Media Server's /photo/:/ transcode transcoder without authentication and without restricting the scheme or host. The endpoint is intentionally excluded from all authentication checks in webstart.py, any value of img beginning with http is passed directly to Plex, this causes the Plex Media Server process, which typically runs on the same host or internal network as Tautulli, with access to RFC-1918 address space, to issue an outbound HTTP request to any attacker-specified URL. This issue has been patched in version 2.17.0.

Affected Products

VendorProductVersions
nulltautulli< 2.17.0

References

  • https://github.com/Tautulli/Tautulli/security/advisories/GHSA-qj2f-4c4p-wv97(x_refsource_CONFIRM)
  • https://github.com/Tautulli/Tautulli/releases/tag/v2.17.0(x_refsource_MISC)

Related News (1 articles)

Tier C
VulDB4h ago
CVE-2026-31804 | Tautulli up to 2.16.x Endpoint /pms_image_proxy img server-side request forgery (GHSA-qj2f-4c4p-wv97)
→ No new info (linked only)
CVSS 3.14.0 CRITICAL
VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
CISA KEV❌ No
Actively exploited✅ Yes
Patch available2.17.0
CWECWE-918
PublishedMar 30, 2026
Last enriched4h agov2
Trending Score49
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-28505EXP
Tautulli: RCE via eval() sandbox bypass using lambda nested scope to escape co_names whitelist check
Trending: 62
HIGHCVE-2026-32275EXP
Tautulli: Unsanitized JSONP callback parameter allows cross-origin script injection and API key theft
Trending: 46
HIGHCVE-2026-31831EXP
Tautulli: Unauthenticated Path Traversal in `/newsletter/image/images` endpoint
Trending: 46
CRITICALCVE-2026-31799
Tautulli: SQL Injection in get_home_stats API endpoint via unsanitised filter parameters
Trending: 38
HIGHCVE-2026-34070EXP
LangChain Core has Path Traversal vulnerabilites in legacy `load_prompt` functions
Trending: 37

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Mar 30, 2026
Discovered by ZDM
Mar 30, 2026
Actively Exploited
Mar 30, 2026
Patch Available
Mar 30, 2026
Updated: severity, activelyExploited, patchAvailable
Mar 30, 2026

Version History

v2
Last enriched 4h ago
v2Tier C4h ago

Updated vendor to Tautulli, changed severity to CRITICAL, marked as actively exploited, and specified patch available in version 2.17.0.

severityactivelyExploitedpatchAvailable
via VulDB
v16h ago

Initial creation