Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. Prior to version 3.1.0, the `GET /api/v1/user/:id` endpoint returns the full settings object for any user, including Pushover, Pushbullet, and Telegram credentials, to any authenticated requester regardless of their privilege level. This vulnerability can be exploited alone or combined with the reported unauthenticated account creation vulnerability, CVE-2026-27707. When combined, the two vulnerabilities create a zero-prior-access chain that leaks third-party API credentials for all users, including administrators. Version 3.1.0 contains a fix for both this vulnerability and for CVE-2026-27707.
References
Configurations
History
04 Mar 2026, 16:47
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:seerr:seerr:*:*:*:*:*:*:*:* | |
| First Time |
Seerr
Seerr seerr |
|
| References | () https://github.com/seerr-team/seerr/commit/4f089b29d0bb41d382168b17aa152eb5b8a25303 - Patch | |
| References | () https://github.com/seerr-team/seerr/releases/tag/v3.1.0 - Release Notes | |
| References | () https://github.com/seerr-team/seerr/security/advisories/GHSA-f7xw-jcqr-57hp - Vendor Advisory |
27 Feb 2026, 20:21
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 20:21
Updated : 2026-03-04 16:47
NVD link : CVE-2026-27793
Mitre link : CVE-2026-27793
CVE.ORG link : CVE-2026-27793
JSON object : View
Products Affected
seerr
- seerr
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
