Description
Tautulli is a Python based monitoring and tracking tool for Plex Media Server. Prior to version 2.17.0, the /newsletter/image/images API endpoint is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. This issue has been patched in version 2.17.0.
Published: 2026-03-30
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated read of arbitrary files
Action: Patch
AI Analysis

Impact

The vulnerability is a classic path traversal flaw in the /newsletter/image/images endpoint of Tautulli. File names supplied to the endpoint are concatenated to a filesystem path without proper sanitization, allowing an attacker to include directory traversal sequences that reference files outside the intended directory. Because the endpoint does not enforce authentication, an unauthenticated attacker can retrieve any file readable by the web server process, exposing configuration data, credentials, or other sensitive information. The weakness is catalogued as CWE‑23.

Affected Systems

All releases of Tautulli prior to version 2.17.0 are susceptible. The affected product is Tautulli, and any build that still includes the /newsletter/image/images API endpoint falls under the impact scope. The CPE string provided identifies the generic package, and no specific sub‑versions are listed, so any pre‑2.17.0 installation should be considered vulnerable.

Risk and Exploitability

The CVSS score of 8.7 signals high severity, while the EPSS score of less than 1% indicates that exploitation is not widespread but still plausible, especially for exposed installations. The vulnerability is not listed in the KEV catalog, but an attacker can trigger it via a simple HTTP GET request to /newsletter/image/images with a crafted filename that includes '..' sequences. Since authentication is not required, any network host that can reach the application can exploit this flaw, posing a significant confidentiality risk.

Generated by OpenCVE AI on April 2, 2026 at 16:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Tautulli to version 2.17.0 or later, which removes the vulnerable endpoint behaviour.
  • Verify that the /newsletter/image/images URL no longer accepts file requests or is protected behind authentication after the upgrade.
  • If an upgrade is not immediately possible, block or restrict the /newsletter/image/images endpoint using a firewall or reverse‑proxy so that only trusted IPs can access it.
  • Monitor web server logs for unusual requests to /newsletter/image/images and alert on attempts that include directory traversal patterns.

Generated by OpenCVE AI on April 2, 2026 at 16:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:tautulli:tautulli:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Tautulli
Tautulli tautulli
Vendors & Products Tautulli
Tautulli tautulli

Tue, 31 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description Tautulli is a Python based monitoring and tracking tool for Plex Media Server. Prior to version 2.17.0, the /newsletter/image/images API endpoint is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. This issue has been patched in version 2.17.0.
Title Tautulli: Unauthenticated Path Traversal in `/newsletter/image/images` endpoint
Weaknesses CWE-23
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Tautulli Tautulli
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T19:09:40.491Z

Reserved: 2026-03-09T17:41:56.077Z

Link: CVE-2026-31831

cve-icon Vulnrichment

Updated: 2026-03-31T19:07:17.037Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-30T20:16:21.673

Modified: 2026-04-02T15:42:45.983

Link: CVE-2026-31831

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:22:52Z

Weaknesses