Description
Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a denial of service vulnerability in the SyncPlay group creation endpoint (POST /SyncPlay/New), where an authenticated user can create groups with names of unlimited size due to insufficient input validation. By sending large payloads combined with arbitrary group IDs, an attacker can lock out the endpoint for other clients attempting to join SyncPlay groups and significantly increase the memory usage of the Jellyfin process, potentially leading to an out-of-memory crash. This issue has been fixed in version 10.11.7.
Published: 2026-04-14
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Now
AI Analysis

Impact

An authenticated user can create SyncPlay groups with arbitrarily long names because the server does not validate the length of the group name field when processing the POST /SyncPlay/New request. The excessive payload size increases the memory footprint of the Jellyfin process, which can grow to the point of exhausting available memory and cause an out‑of‑memory crash, effectively denying service to other clients that attempt to join SyncPlay groups.

Affected Systems

The defect affects all Jellyfin installations running a version earlier than 10.11.7. The vendor, Jellyfin, has released version 10.11.7 and newer in which the input validation has been added. All users of the affected software, regardless of deployment size, are vulnerable until they upgrade.

Risk and Exploitability

The CVSS score of 6.5 indicates a medium severity. Because the exploit requires an authenticated session, the practical threat level depends on the ease of obtaining a Jellyfin account. No exploit probability is available in the EPSS database and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, suggesting that, while the mechanism exists, it has not yet been widely abused. Nevertheless, an attacker who can compromise or create an account can repeatedly submit oversized group names to exhaust memory and disrupt service.

Generated by OpenCVE AI on April 14, 2026 at 23:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy Jellyfin version 10.11.7 or later.
  • Implement a maximum size check for the SyncPlay group name field if upgrading is not immediately feasible.
  • Consider disabling SyncPlay or limiting group creation rate as a temporary measure.

Generated by OpenCVE AI on April 14, 2026 at 23:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*

Wed, 15 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Jellyfin
Jellyfin jellyfin
Vendors & Products Jellyfin
Jellyfin jellyfin

Tue, 14 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
Description Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a denial of service vulnerability in the SyncPlay group creation endpoint (POST /SyncPlay/New), where an authenticated user can create groups with names of unlimited size due to insufficient input validation. By sending large payloads combined with arbitrary group IDs, an attacker can lock out the endpoint for other clients attempting to join SyncPlay groups and significantly increase the memory usage of the Jellyfin process, potentially leading to an out-of-memory crash. This issue has been fixed in version 10.11.7.
Title Jellyfin: Potential Application DoS from excessively large SyncPlay group names
Weaknesses CWE-400
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Jellyfin Jellyfin
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-15T17:48:39.733Z

Reserved: 2026-03-31T21:06:06.427Z

Link: CVE-2026-35034

cve-icon Vulnrichment

Updated: 2026-04-15T17:48:36.837Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-14T23:16:28.977

Modified: 2026-04-23T17:42:24.630

Link: CVE-2026-35034

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:31:57Z

Weaknesses