CVE-2026-32890

Anchorr is a Discord bot for requesting movies and TV shows and receiving notifications when items are added to a media server. In versions 1.4.1 and below, a stored Cross-site Scripting (XSS) vulnerability in the web dashboard's User Mapping dropdown allows any unprivileged Discord user in the configured guild to execute arbitrary JavaScript in the Anchorr admin's browser. By chaining this with the GET /api/config endpoint (which returns all secrets in plaintext), an attacker can exfiltrate every credential stored in Anchorr which includes DISCORD_TOKEN, JELLYFIN_API_KEY, JELLYSEERR_API_KEY, JWT_SECRET, WEBHOOK_SECRET, and bcrypt password hashes without any authentication to Anchorr itself. This issue has been fixed in version 1.4.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openvessl:anchorr:*:*:*:*:*:*:*:*

History

27 Mar 2026, 16:23

Type Values Removed Values Added
CPE cpe:2.3:a:discord:anchorr:*:*:*:*:*:*:*:* cpe:2.3:a:openvessl:anchorr:*:*:*:*:*:*:*:*
First Time Openvessl
Openvessl anchorr

27 Mar 2026, 15:29

Type Values Removed Values Added
Summary
  • (es) Anchorr es un bot de Discord para solicitar películas y programas de TV y recibir notificaciones cuando se añaden elementos a un servidor multimedia. En las versiones 1.4.1 e inferiores, una vulnerabilidad de cross-site scripting (XSS) almacenado en el menú desplegable de Mapeo de Usuarios del panel de control web permite a cualquier usuario de Discord sin privilegios en el gremio configurado ejecutar JavaScript arbitrario en el navegador del administrador de Anchorr. Al encadenar esto con el endpoint GET /API/config (que devuelve todos los secretos en texto plano), un atacante puede exfiltrar cada credencial almacenada en Anchorr, lo que incluye DISCORD_TOKEN, JELLYFIN_API_KEY, JELLYSEERR_API_KEY, JWT_SECRET, WEBHOOK_SECRET y hashes de contraseña bcrypt sin ninguna autenticación a Anchorr mismo. Este problema ha sido solucionado en la versión 1.4.2.
CPE cpe:2.3:a:discord:anchorr:*:*:*:*:*:*:*:*
First Time Discord anchorr
Discord
References () https://github.com/openVESSL/Anchorr/commit/d5ae67e5b455241274ed0072cf2db43a6eb3f0b2 - () https://github.com/openVESSL/Anchorr/commit/d5ae67e5b455241274ed0072cf2db43a6eb3f0b2 - Patch
References () https://github.com/openVESSL/Anchorr/releases/tag/v1.4.2 - () https://github.com/openVESSL/Anchorr/releases/tag/v1.4.2 - Release Notes
References () https://github.com/openVESSL/Anchorr/security/advisories/GHSA-qpmq-6wjc-w28q - () https://github.com/openVESSL/Anchorr/security/advisories/GHSA-qpmq-6wjc-w28q - Vendor Advisory

20 Mar 2026, 19:16

Type Values Removed Values Added
References () https://github.com/openVESSL/Anchorr/security/advisories/GHSA-qpmq-6wjc-w28q - () https://github.com/openVESSL/Anchorr/security/advisories/GHSA-qpmq-6wjc-w28q -

20 Mar 2026, 03:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-20 03:16

Updated : 2026-03-27 16:23


NVD link : CVE-2026-32890

Mitre link : CVE-2026-32890

CVE.ORG link : CVE-2026-32890


JSON object : View

Products Affected

openvessl

  • anchorr
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor