Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:tautulli:tautulli:*:*:*:*:*:*:*:* |
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tautulli
Tautulli tautulli |
|
| Vendors & Products |
Tautulli
Tautulli tautulli |
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tautulli is a Python based monitoring and tracking tool for Plex Media Server. From version 2.14.2 to before version 2.17.0 for parameters "before" and "after" and from version 2.1.0-beta to before version 2.17.0 for parameters "section_id" and "user_id", the /api/v2?cmd=get_home_stats endpoint passes the section_id, user_id, before, and after query parameters directly into SQL via Python %-string formatting without parameterization. An attacker who holds the Tautulli admin API key can inject arbitrary SQL and exfiltrate any value from the Tautulli SQLite database via boolean-blind inference. This issue has been patched in version 2.17.0. | |
| Title | Tautulli: SQL Injection in get_home_stats API endpoint via unsanitised filter parameters | |
| Weaknesses | CWE-20 CWE-89 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-30T20:17:35.823Z
Reserved: 2026-03-09T16:33:42.913Z
Link: CVE-2026-31799
Updated: 2026-03-30T20:17:31.625Z
Status : Analyzed
Published: 2026-03-30T20:16:21.350
Modified: 2026-04-02T16:40:46.130
Link: CVE-2026-31799
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:38:04Z