Anchorr is a Discord bot for requesting movies and TV shows and receiving notifications when items are added to a media server. In versions 1.4.1 and below, a stored Cross-site Scripting (XSS) vulnerability in the web dashboard's User Mapping dropdown allows any unprivileged Discord user in the configured guild to execute arbitrary JavaScript in the Anchorr admin's browser. By chaining this with the GET /api/config endpoint (which returns all secrets in plaintext), an attacker can exfiltrate every credential stored in Anchorr which includes DISCORD_TOKEN, JELLYFIN_API_KEY, JELLYSEERR_API_KEY, JWT_SECRET, WEBHOOK_SECRET, and bcrypt password hashes without any authentication to Anchorr itself. This issue has been fixed in version 1.4.2.
References
Configurations
History
27 Mar 2026, 16:23
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openvessl:anchorr:*:*:*:*:*:*:*:* | |
| First Time |
Openvessl
Openvessl anchorr |
27 Mar 2026, 15:29
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:discord:anchorr:*:*:*:*:*:*:*:* | |
| First Time |
Discord anchorr
Discord |
|
| References | () https://github.com/openVESSL/Anchorr/commit/d5ae67e5b455241274ed0072cf2db43a6eb3f0b2 - Patch | |
| References | () https://github.com/openVESSL/Anchorr/releases/tag/v1.4.2 - Release Notes | |
| References | () https://github.com/openVESSL/Anchorr/security/advisories/GHSA-qpmq-6wjc-w28q - Vendor Advisory |
20 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openVESSL/Anchorr/security/advisories/GHSA-qpmq-6wjc-w28q - |
20 Mar 2026, 03:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-20 03:16
Updated : 2026-03-27 16:23
NVD link : CVE-2026-32890
Mitre link : CVE-2026-32890
CVE.ORG link : CVE-2026-32890
JSON object : View
Products Affected
openvessl
- anchorr
