Ad

CVE-2026-32890

CRITICAL CVSS 3.1: 9.6 EPSS 0.03%
Updated Mar 27, 2026
Openvessl
Parameter Value
CVSS 9.6 (CRITICAL)
Affected Versions before 1.4.1
Fixed In 1.4.2
Type CWE-200 (Information Exposure), CWE-79 (Cross-Site Scripting (XSS))
Vendor Openvessl
Public PoC No

Anchorr is a Discord bot for requesting movies and TV shows and receiving notifications when items are added to a media server. In versions 1.4.1 and below, a stored Cross-site Scripting (XSS) vulnerability in the web dashboard's User Mapping dropdown allows any unprivileged Discord user in the configured guild to execute arbitrary JavaScript in the Anchorr admin's browser. By chaining this with the GET /api/config endpoint (which returns all secrets in plaintext), an attacker can exfiltrate every credential stored in Anchorr which includes DISCORD_TOKEN, JELLYFIN_API_KEY, JELLYSEERR_API_KEY, JWT_SECRET, WEBHOOK_SECRET, and bcrypt password hashes without any authentication to Anchorr itself.

This issue has been fixed in version 1.4.2.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Openvessl Anchorr
cpe:2.3:a:openvessl:anchorr:*:*:*:*:*:*:*:*
<= 1.4.1

Related Vulnerabilities