Plex-configured Seerr instances vulnerable to unauthenticated account registration via Jellyfin authentication endpoint
Description
Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. Starting in version 2.0.0 and prior to version 3.1.0, an authentication guard logic flaw in POST /api/v1/auth/jellyfin allows an unauthenticated attacker to register a new Seerr account on any Plex-configured instance by authenticating with an attacker-controlled Jellyfin server. The attacker receives an authenticated session and can immediately use the application with default permissions, including the ability to submit media requests to Radarr/Sonarr. Any Seerr deployment where all three of the following are true may be vulnerable: settings.main.mediaServerType is set to PLEX (the most common deployment).; settings.jellyfin.ip is set to "" (default, meaning Jellyfin was never configured); and settings.main.newPlexLogin is set to true (default). Jellyfin-configured and Emby-configured deployments are not affected. Version 3.1.0 of Seerr fixes this issue.
Affected products
2- seerr-team/seerrv5Range: >= 2.0.0, < 3.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/seerr-team/seerr/commit/4ae20684092b5b28527b23dfbc1a3417858fee8emitrex_refsource_MISC
- github.com/seerr-team/seerr/releases/tag/v3.1.0mitrex_refsource_MISC
- github.com/seerr-team/seerr/security/advisories/GHSA-rc4w-7m3r-c2f7mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.