Description
Tautulli is a Python based monitoring and tracking tool for Plex Media Server. From version 2.14.2 to before version 2.17.0 for parameters "before" and "after" and from version 2.1.0-beta to before version 2.17.0 for parameters "section_id" and "user_id", the /api/v2?cmd=get_home_stats endpoint passes the section_id, user_id, before, and after query parameters directly into SQL via Python %-string formatting without parameterization. An attacker who holds the Tautulli admin API key can inject arbitrary SQL and exfiltrate any value from the Tautulli SQLite database via boolean-blind inference. This issue has been patched in version 2.17.0.
Published: 2026-03-30
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection leading to data exfiltration
Action: Patch
AI Analysis

Impact

The vulnerability allows authenticated attackers holding the Tautulli admin API key to inject arbitrary SQL into the /api/v2?cmd=get_home_stats endpoint. The backend concatenates the "before", "after", "section_id", and "user_id" query parameters into a SQL statement using Python string formatting without parameterization. This permits boolean‑blind inference to read values from the SQLite database, enabling exfiltration of any data stored by Tautulli. The weakness is a classic SQL injection scenario (CWE‑89) arising from unsafe input handling (CWE‑20).

Affected Systems

Affected systems are instances of the Tautulli monitoring and tracking tool for Plex Media Server. Any installation running Tautulli version 2.14.2 through 2.16.x (inclusive) suffers from the injection via the "before" and "after" parameters, while versions 2.1.0‑beta to 2.16.x also contain the issue for the "section_id" and "user_id" parameters. The problem exists in all builds before the 2.17.0 release, which includes the patched version 2.17.0. Tautulli is a Python application hosted on various operating systems; the vulnerability is present wherever the vulnerable API endpoint is enabled.

Risk and Exploitability

With a CVSS score of 4.9, the vulnerability is considered moderate. The EPSS score is not available, so the likelihood of automated exploitation is unclear, but the attacker simply needs to possess a valid admin API key to construct the malicious request. Because the endpoint is exposed over the network and the injection occurs client‑side, if an attacker can guess or compromise the key, the data exfiltration can be performed without additional privileges. The issue is not yet listed in the CISA KEV catalog, indicating no known public exploitation instances. Nevertheless, the potential impact on confidentiality justifies prompt remediation.

Generated by OpenCVE AI on March 31, 2026 at 04:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Tautulli 2.17.0 or later.
  • If an upgrade cannot be applied immediately, restrict exposure of the /api/v2 endpoint to trusted networks or IP addresses.
  • Protect and rotate the admin API key so that only authorized users have access.
  • Monitor API usage logs for abnormal patterns and block suspicious requests.

Generated by OpenCVE AI on March 31, 2026 at 04:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Tautulli
Tautulli tautulli
Vendors & Products Tautulli
Tautulli tautulli

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description Tautulli is a Python based monitoring and tracking tool for Plex Media Server. From version 2.14.2 to before version 2.17.0 for parameters "before" and "after" and from version 2.1.0-beta to before version 2.17.0 for parameters "section_id" and "user_id", the /api/v2?cmd=get_home_stats endpoint passes the section_id, user_id, before, and after query parameters directly into SQL via Python %-string formatting without parameterization. An attacker who holds the Tautulli admin API key can inject arbitrary SQL and exfiltrate any value from the Tautulli SQLite database via boolean-blind inference. This issue has been patched in version 2.17.0.
Title Tautulli: SQL Injection in get_home_stats API endpoint via unsanitised filter parameters
Weaknesses CWE-20
CWE-89
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Tautulli Tautulli
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-30T20:17:35.823Z

Reserved: 2026-03-09T16:33:42.913Z

Link: CVE-2026-31799

cve-icon Vulnrichment

Updated: 2026-03-30T20:17:31.625Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-03-30T20:16:21.350

Modified: 2026-04-01T14:24:21.833

Link: CVE-2026-31799

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:40:17Z

Weaknesses