We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32012

Jellyfin Vulnerable to Denial of Service (DoS) via IP Spoofing



Description

Jellyfin is an open source self hosted media server. In versions 10.9.0 to before 10.10.7, the /System/Restart endpoint provides administrators the ability to restart their Jellyfin server. This endpoint is intended to be admins-only, but it also authorizes requests from any device in the same local network as the Jellyfin server. Due to the method Jellyfin uses to determine the source IP of a request, an unauthenticated attacker is able to spoof their IP to appear as a LAN IP, allowing them to restart the Jellyfin server process without authentication. This means that an unauthenticated attacker could mount a denial-of-service attack on any default-configured Jellyfin server by simply sending the same spoofed request every few seconds to restart the server over and over. This method of IP spoofing also bypasses some security mechanisms, cause a denial-of-service attack, and possible bypass the admin restart requirement if combined with remote code execution. This issue is patched in version 10.10.7.

Reserved 2025-04-01 | Published 2025-04-15 | Updated 2025-04-15 | Assigner GitHub_M


MEDIUM: 4.6CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U

Problem types

CWE-290: Authentication Bypass by Spoofing

Product status

>= 10.9.0, < 10.10.7
affected

References

github.com/...llyfin/security/advisories/GHSA-qcmf-gmhm-rfv9

github.com/...ommit/f625665cb116a7e3feb8b79aaf1ed39a956e0585

cve.org (CVE-2025-32012)

nvd.nist.gov (CVE-2025-32012)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32012

Support options

Helpdesk Chat, Email, Knowledgebase