Seerr has Broken Object-Level Authorization in User Profile Endpoint that Exposes Third-Party Notification Credentials
Description
Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. Prior to version 3.1.0, the GET /api/v1/user/:id endpoint returns the full settings object for any user, including Pushover, Pushbullet, and Telegram credentials, to any authenticated requester regardless of their privilege level. This vulnerability can be exploited alone or combined with the reported unauthenticated account creation vulnerability, CVE-2026-27707. When combined, the two vulnerabilities create a zero-prior-access chain that leaks third-party API credentials for all users, including administrators. Version 3.1.0 contains a fix for both this vulnerability and for CVE-2026-27707.
Affected products
2- seerr-team/seerrv5Range: < 3.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/seerr-team/seerr/commit/4f089b29d0bb41d382168b17aa152eb5b8a25303mitrex_refsource_MISC
- github.com/seerr-team/seerr/releases/tag/v3.1.0mitrex_refsource_MISC
- github.com/seerr-team/seerr/security/advisories/GHSA-f7xw-jcqr-57hpmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.