Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31852: CWE-269: Improper Privilege Management in jellyfin code-quality.yml

0
Critical
VulnerabilityCVE-2026-31852cvecve-2026-31852cwe-269
Published: Wed Mar 11 2026 (03/11/2026, 17:04:53 UTC)
Source: CVE Database V5
Vendor/Project: jellyfin
Product: code-quality.yml

Description

CVE-2026-31852 is a critical vulnerability in the GitHub Actions workflow (code-quality. yml) of the jellyfin/jellyfin-ios repository. It allows arbitrary code execution via pull requests from forked repositories due to overly permissive workflow permissions. Exploitation can lead to full repository takeover, exfiltration of privileged secrets, supply chain attacks on the Apple App Store, package poisoning in GitHub Container Registry, and compromise of the entire jellyfin organization through cross-repository token misuse. This vulnerability is not in the application code itself but in the CI/CD workflow configuration. No new software version is required to fix this issue, and end users do not need to take direct action. The CVSS score is 10. 0, indicating critical severity with network attack vector, no privileges or user interaction required, and complete confidentiality, integrity, and availability impact.

AI-Powered Analysis

AILast updated: 03/11/2026, 18:51:43 UTC

Technical Analysis

CVE-2026-31852 is a critical security vulnerability identified in the GitHub Actions workflow file code-quality.yml within the jellyfin/jellyfin-ios repository. The vulnerability arises from improper privilege management (CWE-269) in the workflow configuration, which grants nearly all write permissions to the workflow. This misconfiguration allows an attacker to execute arbitrary code by submitting a pull request from a forked repository. Since GitHub Actions workflows run with elevated permissions, an attacker exploiting this flaw can gain full control over the jellyfin/jellyfin-ios repository. This includes the ability to exfiltrate highly privileged secrets stored in the repository or GitHub environment variables, perform supply chain attacks by injecting malicious code into Apple App Store submissions, and poison packages in the GitHub Container Registry (ghcr.io). Furthermore, the attacker can leverage cross-repository token usage to compromise the entire jellyfin organization, escalating the impact beyond a single repository. Importantly, this vulnerability is not due to a flaw in the Jellyfin application code but rather in the continuous integration and deployment (CI/CD) pipeline configuration. The vulnerability affects versions prior to commit 109217e75f38394b2f6e46e25dfe5a721203d3c8. The CVSS v3.1 score is 10.0, reflecting its critical nature with network attack vector, no required privileges or user interaction, and complete compromise of confidentiality, integrity, and availability. No patch or new software release is necessary as the fix involves adjusting GitHub Actions workflow permissions. End users are not required to take any action, but repository maintainers must update their workflow configurations to restrict permissions and prevent arbitrary code execution from untrusted pull requests.

Potential Impact

The impact of CVE-2026-31852 is severe and multifaceted. Organizations relying on the jellyfin/jellyfin-ios repository or related projects face the risk of complete repository takeover, which can lead to unauthorized code changes, insertion of backdoors, or malicious payloads. The exfiltration of highly privileged secrets could expose sensitive credentials, tokens, or API keys, potentially compromising other integrated systems or services. The ability to perform supply chain attacks on the Apple App Store could result in malicious versions of the Jellyfin iOS app being distributed to end users, undermining user trust and causing widespread harm. Package poisoning in the GitHub Container Registry could affect containerized deployments downstream, spreading the compromise further. The cross-repository token misuse elevates the threat to the entire jellyfin organization, risking broader organizational compromise. Although no known exploits are currently in the wild, the critical severity and ease of exploitation (no privileges or user interaction required) make this a high-risk vulnerability that could be leveraged by attackers to conduct supply chain attacks, espionage, or widespread disruption. Organizations using or contributing to Jellyfin should consider the potential for indirect impact if their supply chain includes this repository.

Mitigation Recommendations

To mitigate CVE-2026-31852, repository maintainers must immediately review and restrict the permissions granted to GitHub Actions workflows, especially those triggered by pull requests from forked repositories. Specifically, the code-quality.yml workflow should be updated to use the least privilege principle by limiting write permissions and avoiding the use of secrets or tokens in workflows triggered by untrusted contributors. Implementing GitHub's recommended best practices for workflow security, such as enabling 'pull_request_target' workflows only when necessary and avoiding exposing sensitive secrets to forked pull requests, is critical. Additionally, maintainers should consider using environment protection rules, required reviewers, and branch protection policies to reduce the risk of unauthorized workflow execution. Regular audits of CI/CD configurations and secrets management policies are advised to detect and remediate similar misconfigurations. Organizations consuming Jellyfin iOS builds should verify the integrity of builds and monitor for suspicious activity related to supply chain attacks. While no user action is required, developers and maintainers must prioritize updating workflow permissions to prevent exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T19:02:25.010Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1b88b2f860ef9436021d8

Added to database: 3/11/2026, 6:46:35 PM

Last enriched: 3/11/2026, 6:51:43 PM

Last updated: 3/11/2026, 11:45:19 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses