Vulnerability Details CVE-2026-35034
Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a denial of service vulnerability in the SyncPlay group creation endpoint (POST /SyncPlay/New), where an authenticated user can create groups with names of unlimited size due to insufficient input validation. By sending large payloads combined with arbitrary group IDs, an attacker can lock out the endpoint for other clients attempting to join SyncPlay groups and significantly increase the memory usage of the Jellyfin process, potentially leading to an out-of-memory crash. This issue has been fixed in version 10.11.7.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 14.3%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2026-35034
-
cpe:2.3:a:jellyfin:jellyfin:-
-
cpe:2.3:a:jellyfin:jellyfin:10.0.0
-
cpe:2.3:a:jellyfin:jellyfin:10.0.1
-
cpe:2.3:a:jellyfin:jellyfin:10.0.2
-
cpe:2.3:a:jellyfin:jellyfin:10.1.0
-
cpe:2.3:a:jellyfin:jellyfin:10.10.0
-
cpe:2.3:a:jellyfin:jellyfin:10.10.1
-
cpe:2.3:a:jellyfin:jellyfin:10.10.2
-
cpe:2.3:a:jellyfin:jellyfin:10.10.3
-
cpe:2.3:a:jellyfin:jellyfin:10.10.4
-
cpe:2.3:a:jellyfin:jellyfin:10.10.5
-
cpe:2.3:a:jellyfin:jellyfin:10.10.6
-
cpe:2.3:a:jellyfin:jellyfin:10.10.7
-
cpe:2.3:a:jellyfin:jellyfin:10.11.0
-
cpe:2.3:a:jellyfin:jellyfin:10.11.1
-
cpe:2.3:a:jellyfin:jellyfin:10.11.2
-
cpe:2.3:a:jellyfin:jellyfin:10.11.3
-
cpe:2.3:a:jellyfin:jellyfin:10.11.4
-
cpe:2.3:a:jellyfin:jellyfin:10.11.5
-
cpe:2.3:a:jellyfin:jellyfin:10.11.6
-
cpe:2.3:a:jellyfin:jellyfin:10.2.0
-
cpe:2.3:a:jellyfin:jellyfin:10.2.1
-
cpe:2.3:a:jellyfin:jellyfin:10.2.2
-
cpe:2.3:a:jellyfin:jellyfin:10.3.0
-
cpe:2.3:a:jellyfin:jellyfin:10.3.1
-
cpe:2.3:a:jellyfin:jellyfin:10.3.2
-
cpe:2.3:a:jellyfin:jellyfin:10.3.3
-
cpe:2.3:a:jellyfin:jellyfin:10.3.4
-
cpe:2.3:a:jellyfin:jellyfin:10.3.5
-
cpe:2.3:a:jellyfin:jellyfin:10.3.6
-
cpe:2.3:a:jellyfin:jellyfin:10.3.7
-
cpe:2.3:a:jellyfin:jellyfin:10.4.0
-
cpe:2.3:a:jellyfin:jellyfin:10.4.1
-
cpe:2.3:a:jellyfin:jellyfin:10.4.2
-
cpe:2.3:a:jellyfin:jellyfin:10.4.3
-
cpe:2.3:a:jellyfin:jellyfin:10.5.0
-
cpe:2.3:a:jellyfin:jellyfin:10.5.1
-
cpe:2.3:a:jellyfin:jellyfin:10.5.2
-
cpe:2.3:a:jellyfin:jellyfin:10.5.3
-
cpe:2.3:a:jellyfin:jellyfin:10.5.4
-
cpe:2.3:a:jellyfin:jellyfin:10.5.5
-
cpe:2.3:a:jellyfin:jellyfin:10.6.0
-
cpe:2.3:a:jellyfin:jellyfin:10.6.1
-
cpe:2.3:a:jellyfin:jellyfin:10.6.2
-
cpe:2.3:a:jellyfin:jellyfin:10.6.3
-
cpe:2.3:a:jellyfin:jellyfin:10.6.4
-
cpe:2.3:a:jellyfin:jellyfin:10.7.0
-
cpe:2.3:a:jellyfin:jellyfin:10.7.1
-
cpe:2.3:a:jellyfin:jellyfin:10.7.2
-
cpe:2.3:a:jellyfin:jellyfin:10.7.3
-
cpe:2.3:a:jellyfin:jellyfin:10.7.4
-
cpe:2.3:a:jellyfin:jellyfin:10.7.5
-
cpe:2.3:a:jellyfin:jellyfin:10.7.6
-
cpe:2.3:a:jellyfin:jellyfin:10.7.7
-
cpe:2.3:a:jellyfin:jellyfin:10.8.0
-
cpe:2.3:a:jellyfin:jellyfin:10.8.1
-
cpe:2.3:a:jellyfin:jellyfin:10.8.10
-
cpe:2.3:a:jellyfin:jellyfin:10.8.11
-
cpe:2.3:a:jellyfin:jellyfin:10.8.12
-
cpe:2.3:a:jellyfin:jellyfin:10.8.13
-
cpe:2.3:a:jellyfin:jellyfin:10.8.2
-
cpe:2.3:a:jellyfin:jellyfin:10.8.3
-
cpe:2.3:a:jellyfin:jellyfin:10.8.4
-
cpe:2.3:a:jellyfin:jellyfin:10.8.5
-
cpe:2.3:a:jellyfin:jellyfin:10.8.6
-
cpe:2.3:a:jellyfin:jellyfin:10.8.7
-
cpe:2.3:a:jellyfin:jellyfin:10.8.8
-
cpe:2.3:a:jellyfin:jellyfin:10.8.9
-
cpe:2.3:a:jellyfin:jellyfin:10.9.0
-
cpe:2.3:a:jellyfin:jellyfin:10.9.1
-
cpe:2.3:a:jellyfin:jellyfin:10.9.10
-
cpe:2.3:a:jellyfin:jellyfin:10.9.11
-
cpe:2.3:a:jellyfin:jellyfin:10.9.2
-
cpe:2.3:a:jellyfin:jellyfin:10.9.3
-
cpe:2.3:a:jellyfin:jellyfin:10.9.4
-
cpe:2.3:a:jellyfin:jellyfin:10.9.5
-
cpe:2.3:a:jellyfin:jellyfin:10.9.6
-
cpe:2.3:a:jellyfin:jellyfin:10.9.7
-
cpe:2.3:a:jellyfin:jellyfin:10.9.8
-
cpe:2.3:a:jellyfin:jellyfin:10.9.9