{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T20:41:04.544","vulnerabilities":[{"cve":{"id":"CVE-2026-27793","sourceIdentifier":"security-advisories@github.com","published":"2026-02-27T20:21:39.587","lastModified":"2026-03-04T16:47:37.490","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. Prior to version 3.1.0, the `GET /api/v1/user/:id` endpoint returns the full settings object for any user, including Pushover, Pushbullet, and Telegram credentials, to any authenticated requester regardless of their privilege level. This vulnerability can be exploited alone or combined with the reported unauthenticated account creation vulnerability, CVE-2026-27707. When combined, the two vulnerabilities create a zero-prior-access chain that leaks third-party API credentials for all users, including administrators. Version 3.1.0 contains a fix for both this vulnerability and for CVE-2026-27707."},{"lang":"es","value":"Seerr es un gestor de solicitudes y descubrimiento de medios de código abierto para Jellyfin, Plex y Emby. Antes de la versión 3.1.0, el endpoint 'GET /api/v1/user/:id' devuelve el objeto de configuración completo para cualquier usuario, incluyendo credenciales de Pushover, Pushbullet y Telegram, a cualquier solicitante autenticado independientemente de su nivel de privilegio. Esta vulnerabilidad puede ser explotada sola o combinada con la vulnerabilidad de creación de cuentas no autenticadas reportada, CVE-2026-27707. Cuando se combinan, las dos vulnerabilidades crean una cadena de acceso previo cero que filtra credenciales de API de terceros para todos los usuarios, incluyendo administradores. La versión 3.1.0 contiene una solución para esta vulnerabilidad y para CVE-2026-27707."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:seerr:seerr:*:*:*:*:*:*:*:*","versionEndExcluding":"3.1.0","matchCriteriaId":"7BB6479F-6D32-46FD-8EB0-27A92F2C38C9"}]}]}],"references":[{"url":"https://github.com/seerr-team/seerr/commit/4f089b29d0bb41d382168b17aa152eb5b8a25303","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/seerr-team/seerr/releases/tag/v3.1.0","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/seerr-team/seerr/security/advisories/GHSA-f7xw-jcqr-57hp","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}