Unrated severityNVD Advisory· Published Feb 20, 2026· Updated Feb 20, 2026
Music Assistant Server Path Traversal in Playlist Update API Allows Remote Code Execution
CVE-2026-26975
Description
Music Assistant is an open-source media library manager that integrates streaming services with connected speakers. Versions 2.6.3 and below allow unauthenticated network-adjacent attackers to execute arbitrary code on affected installations. The music/playlists/update API allows users to bypass the .m3u extension enforcement and write files anywhere on the filesystem, which is exacerbated by the container running as root. This can be exploited to achieve Remote Code Execution by writing a malicious .pth file to the Python site-packages directory, which will execute arbitrary commands when Python loads. This issue has been fixed in version 2.7.0.
Affected products
2- Range: <=2.6.3
- music-assistant/serverv5Range: < 2.7.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/music-assistant/server/pull/2684mitrex_refsource_MISC
- github.com/music-assistant/server/releases/tag/2.7.0mitrex_refsource_MISC
- github.com/music-assistant/server/security/advisories/GHSA-7jcc-p6xr-835jmitrex_refsource_CONFIRM
News mentions
1- ZDI-26-133: (Pwn2Own) Music Assistant _update_library_item External Control of File Path Remote Code Execution VulnerabilityZero Day Initiative · Mar 3, 2026