๐Ÿ” CVE Alert

CVE-2026-27793

MEDIUM 6.5

Seerr has Broken Object-Level Authorization in User Profile Endpoint that Exposes Third-Party Notification Credentials

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. Prior to version 3.1.0, the `GET /api/v1/user/:id` endpoint returns the full settings object for any user, including Pushover, Pushbullet, and Telegram credentials, to any authenticated requester regardless of their privilege level. This vulnerability can be exploited alone or combined with the reported unauthenticated account creation vulnerability, CVE-2026-27707. When combined, the two vulnerabilities create a zero-prior-access chain that leaks third-party API credentials for all users, including administrators. Version 3.1.0 contains a fix for both this vulnerability and for CVE-2026-27707.

CWE CWE-639
Vendor seerr-team
Product seerr
Published Feb 27, 2026
Last Updated Mar 2, 2026
Stay Ahead of the Next One

Get instant alerts for seerr-team seerr

Be the first to know when new medium vulnerabilities affecting seerr-team seerr are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

seerr-team / seerr
< 3.1.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/seerr-team/seerr/security/advisories/GHSA-f7xw-jcqr-57hp github.com: https://github.com/seerr-team/seerr/commit/4f089b29d0bb41d382168b17aa152eb5b8a25303 github.com: https://github.com/seerr-team/seerr/releases/tag/v3.1.0