The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-41167

CVE-2026-41167: Jellystat SQL Injection Vulnerability

CVE-2026-41167 is a SQL injection flaw in Jellystat that allows authenticated attackers to read database credentials and execute arbitrary commands. This article covers technical details, affected versions, and mitigations.

Published: April 23, 2026

CVE-2026-41167 Overview

CVE-2026-41167 is a critical SQL Injection vulnerability affecting Jellystat, a free and open source Statistics App for Jellyfin. Prior to version 1.1.10, multiple API endpoints in Jellystat build SQL queries by interpolating unsanitized request-body fields directly into raw SQL strings. An authenticated user can inject arbitrary SQL via POST /api/getUserDetails and POST /api/getLibrary, enabling full read of any table in the database - including app_config, which stores the Jellystat admin credentials, the Jellyfin API key, and the Jellyfin host URL.

Because the vulnerable call site dispatches via node-postgres's simple query protocol (no parameter array is passed), stacked queries are allowed, which escalates the injection from data disclosure to arbitrary command execution on the PostgreSQL host via COPY ... TO PROGRAM. Under the role shipped by the project's docker-compose.yml (a PostgreSQL superuser), no additional privileges are required to reach the RCE primitive.

Critical Impact

This SQL Injection vulnerability allows authenticated attackers to escalate from data disclosure to full remote code execution on the PostgreSQL host, potentially compromising the entire server infrastructure.

Affected Products

  • Jellystat versions prior to 1.1.10
  • Jellystat installations using the default docker-compose.yml with PostgreSQL superuser role
  • Jellyfin environments with Jellystat statistics integration

Discovery Timeline

  • 2026-04-22 - CVE CVE-2026-41167 published to NVD
  • 2026-04-23 - Last updated in NVD database

Technical Details for CVE-2026-41167

Vulnerability Analysis

This vulnerability is classified as CWE-89 (SQL Injection), representing a severe failure in input validation within the Jellystat application. The vulnerable endpoints accept user-controlled data in HTTP POST request bodies and directly concatenate this input into SQL query strings without proper sanitization or parameterization.

The attack surface is accessible to any authenticated user of the Jellystat application. Once exploited, attackers gain the ability to execute arbitrary SQL commands against the PostgreSQL database. The sensitive data at risk includes Jellystat admin credentials, Jellyfin API keys, and Jellyfin host URLs stored in the app_config table.

What makes this vulnerability particularly dangerous is the exploitation chain it enables. The use of node-postgres's simple query protocol without a parameter array permits stacked queries. This allows attackers to chain multiple SQL statements together, escalating from simple data exfiltration to leveraging PostgreSQL's COPY ... TO PROGRAM functionality for arbitrary command execution on the underlying host operating system.

Root Cause

The root cause of this vulnerability lies in the application's direct string interpolation of user-supplied request body fields into SQL query construction. Rather than using parameterized queries or prepared statements - which would properly escape and sanitize input - the application concatenates raw user input directly into SQL strings.

The node-postgres library supports parameterized queries that would prevent SQL injection, but the vulnerable code paths in POST /api/getUserDetails and POST /api/getLibrary do not utilize this security feature. Additionally, the default deployment configuration grants PostgreSQL superuser privileges, eliminating any database-level privilege barriers that might otherwise limit the impact of successful exploitation.

Attack Vector

The attack vector is network-based, requiring only authenticated access to the Jellystat web application. An attacker with valid credentials (even low-privileged) can craft malicious HTTP POST requests to the vulnerable API endpoints.

The exploitation flow involves sending a specially crafted JSON payload to either /api/getUserDetails or /api/getLibrary endpoints. The malicious SQL payload embedded in the request body is then interpolated into the SQL query and executed by the database. Initial exploitation allows data exfiltration from any database table, while advanced exploitation uses stacked queries with COPY ... TO PROGRAM to execute arbitrary system commands on the PostgreSQL server host.

For technical details on the specific vulnerable code patterns and exploitation techniques, refer to the GitHub Security Advisory.

Detection Methods for CVE-2026-41167

Indicators of Compromise

  • Unusual or malformed HTTP POST requests to /api/getUserDetails or /api/getLibrary endpoints containing SQL syntax characters such as single quotes, semicolons, or UNION keywords
  • PostgreSQL log entries showing COPY ... TO PROGRAM commands or unexpected query patterns
  • Unexpected outbound network connections from the PostgreSQL server or container
  • Unauthorized access or modifications to the app_config table or other database tables

Detection Strategies

  • Implement Web Application Firewall (WAF) rules to detect SQL injection patterns in POST request bodies targeting Jellystat API endpoints
  • Enable PostgreSQL query logging and monitor for suspicious query patterns including stacked queries and COPY ... TO PROGRAM usage
  • Deploy endpoint detection and response (EDR) solutions such as SentinelOne Singularity to identify command execution originating from PostgreSQL processes
  • Review application access logs for repeated failed authentication attempts followed by successful access to vulnerable endpoints

Monitoring Recommendations

  • Configure alerting on PostgreSQL audit logs for queries accessing the app_config table from unexpected sources
  • Monitor for process spawning from the PostgreSQL service or container, particularly shell processes or network utilities
  • Implement network segmentation monitoring to detect lateral movement attempts from compromised Jellystat or PostgreSQL hosts
  • Enable real-time log correlation across web application, database, and host-level logs to identify multi-stage attack patterns

How to Mitigate CVE-2026-41167

Immediate Actions Required

  • Upgrade Jellystat to version 1.1.10 or later immediately to apply the security fix
  • Audit PostgreSQL database access logs for evidence of SQL injection attempts or data exfiltration
  • Rotate all credentials stored in the Jellystat app_config table, including admin credentials and Jellyfin API keys
  • Review and restrict PostgreSQL user privileges - avoid running the database with superuser privileges in production

Patch Information

The vulnerability has been addressed in Jellystat version 1.1.10. The fix is available in GitHub commit 735fe7c6eb0e3e34e92a8a82fd21914d76693665. Organizations should upgrade to this version or later to remediate the SQL injection vulnerability.

For complete details on the vulnerability and remediation, refer to the GitHub Security Advisory GHSA-fj7c-2p5q-g56m.

Workarounds

  • Implement network-level access controls to restrict access to Jellystat API endpoints to trusted IP addresses only until patching is complete
  • Deploy a reverse proxy with Web Application Firewall (WAF) capabilities to filter SQL injection payloads in request bodies
  • Modify the PostgreSQL deployment to use a non-superuser role with minimal required privileges, reducing RCE impact if exploited
  • Temporarily disable or restrict authentication to vulnerable endpoints if application functionality permits
bash
# Example: Restrict PostgreSQL user privileges (execute as PostgreSQL admin)
# Create a new limited-privilege role for Jellystat
CREATE ROLE jellystat_app WITH LOGIN PASSWORD 'secure_password';
GRANT CONNECT ON DATABASE jellystat TO jellystat_app;
GRANT SELECT, INSERT, UPDATE, DELETE ON ALL TABLES IN SCHEMA public TO jellystat_app;
REVOKE ALL ON FUNCTION pg_catalog.pg_read_file(text) FROM jellystat_app;
REVOKE ALL ON FUNCTION pg_catalog.pg_write_file(text, text) FROM jellystat_app;

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeSQLI

  • Vendor/TechJellystat

  • SeverityCRITICAL

  • CVSS Score9.1

  • EPSS Probability0.08%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-89
  • Technical References
  • GitHub Commit Update

  • GitHub Security Advisory
  • Latest CVEs
  • CVE-2025-52479: HTTP.jl & URIs.jl CRLF Injection Flaw

  • CVE-2026-31740: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31743: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31744: Linux Kernel NULL Pointer Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English