CVE-2026-31831
Received Received - Intake
Path Traversal in Tautulli /newsletter/image/images Allows File Disclosure

Publication date: 2026-03-30

Last updated on: 2026-04-02

Assigner: GitHub, Inc.

Description
Tautulli is a Python based monitoring and tracking tool for Plex Media Server. Prior to version 2.17.0, the /newsletter/image/images API endpoint is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. This issue has been patched in version 2.17.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-30
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2026-03-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tautulli tautulli to 2.17.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-23 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-31831 is an unauthenticated path traversal vulnerability in the `/newsletter/image/images` API endpoint of Tautulli versions 2.16.1 and earlier.

The vulnerability occurs because the endpoint improperly handles user-supplied input used to build file paths, failing to block directory traversal sequences like `..`. This allows attackers to access files outside the intended directory on the server's filesystem.

Attackers can exploit this flaw without authentication by sending specially crafted HTTP requests with encoded traversal sequences to read arbitrary files.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to read arbitrary files from the server, including sensitive files such as the SQLite database containing active JWT tokens and configuration files with hashed admin passwords and Plex Media Server tokens.

This unauthorized access and potential exfiltration of sensitive authentication tokens and credentials could lead to administrative control over the application, resulting in a significant data breach.

Such a breach could compromise the confidentiality and integrity of personal data managed by the application, thereby impacting compliance with data protection regulations like GDPR and HIPAA, which require safeguarding sensitive information against unauthorized access.


How can this vulnerability impact me? :

This vulnerability can have significant impacts because attackers can read sensitive files from the server.

  • Attackers can exfiltrate the SQLite database `tautulli.db`, which contains active JWT tokens.
  • They can also access the `config.ini` file, which holds the hashed admin password, JWT token secret, and Plex Media Server tokens and connection details.

With this information, attackers may crack the admin password or use valid JWT tokens to escalate privileges and gain administrative control over the Tautulli application.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for HTTP requests targeting the `/newsletter/image/images` API endpoint that include directory traversal sequences such as `..` or their encoded equivalents. Attackers exploit this by sending crafted requests to read arbitrary files from the server.

Proof-of-concept commands involve sending HTTP requests with encoded traversal sequences to retrieve sensitive files like `config.ini` or `tautulli.db`. For example, an attacker might use curl commands to request paths containing `..%2F` to attempt to access files outside the intended directory.

  • Monitor web server logs for requests to `/newsletter/image/images` containing `..` or URL-encoded traversal patterns such as `%2E%2E%2F`.
  • Use network monitoring tools or intrusion detection systems (IDS) to flag suspicious HTTP requests with directory traversal payloads targeting the vulnerable endpoint.
  • Example curl command to test for the vulnerability (do not run on unauthorized systems): curl -v "http://<target>/newsletter/image/images?file=..%2F..%2Fconfig.ini"

What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to upgrade Tautulli to version 2.17.0 or later, where the issue has been patched.

Until the upgrade can be performed, restrict access to the `/newsletter/image/images` API endpoint by implementing network-level controls such as firewall rules or web application firewall (WAF) rules to block unauthenticated requests.

Additionally, monitor logs for suspicious activity and consider rotating any potentially compromised credentials or tokens stored in the affected files.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart