{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T20:32:16.408","vulnerabilities":[{"cve":{"id":"CVE-2026-27707","sourceIdentifier":"security-advisories@github.com","published":"2026-02-27T20:21:38.760","lastModified":"2026-03-04T16:54:47.437","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. Starting in version 2.0.0 and prior to version 3.1.0, an authentication guard logic flaw in `POST /api/v1/auth/jellyfin` allows an unauthenticated attacker to register a new Seerr account on any Plex-configured instance by authenticating with an attacker-controlled Jellyfin server. The attacker receives an authenticated session and can immediately use the application with default permissions, including the ability to submit media requests to Radarr/Sonarr. Any Seerr deployment where all three of the following are true may be vulnerable: `settings.main.mediaServerType` is set to `PLEX` (the most common deployment).; `settings.jellyfin.ip` is set to `\"\"` (default, meaning Jellyfin was never configured); and `settings.main.newPlexLogin` is set to `true` (default). Jellyfin-configured and Emby-configured deployments are not affected. Version 3.1.0 of Seerr fixes this issue."},{"lang":"es","value":"Seerr es un gestor de solicitudes y descubrimiento de medios de código abierto para Jellyfin, Plex y Emby. A partir de la versión 2.0.0 y antes de la versión 3.1.0, una falla lógica en la protección de autenticación en 'POST /API/v1/auth/jellyfin' permite a un atacante no autenticado registrar una nueva cuenta de Seerr en cualquier instancia configurada con Plex autenticándose con un servidor Jellyfin controlado por el atacante. El atacante recibe una sesión autenticada y puede usar inmediatamente la aplicación con permisos predeterminados, incluida la capacidad de enviar solicitudes de medios a Radarr/Sonarr. Cualquier implementación de Seerr donde se cumplan las tres condiciones siguientes puede ser vulnerable: 'settings.main.mediaServerType' está configurado como 'PLEX' (la implementación más común).; 'settings.jellyfin.ip' está configurado como '\"\"' (predeterminado, lo que significa que Jellyfin nunca fue configurado); y 'settings.main.newPlexLogin' está configurado como 'true' (predeterminado). Las implementaciones configuradas con Jellyfin y Emby no se ven afectadas. La versión 3.1.0 de Seerr soluciona este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-288"},{"lang":"en","value":"CWE-807"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:seerr:seerr:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"3.1.0","matchCriteriaId":"142465B9-9DE4-46F9-B457-572048968C86"}]}]}],"references":[{"url":"https://github.com/seerr-team/seerr/commit/4ae20684092b5b28527b23dfbc1a3417858fee8e","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/seerr-team/seerr/releases/tag/v3.1.0","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/seerr-team/seerr/security/advisories/GHSA-rc4w-7m3r-c2f7","source":"security-advisories@github.com","tags":["Vendor Advisory","Exploit"]}]}}]}