CVE-2026-27707

Source
https://cve.org/CVERecord?id=CVE-2026-27707
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27707.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27707
Aliases
  • GHSA-rc4w-7m3r-c2f7
Published
2026-02-27T19:29:18.768Z
Modified
2026-03-03T02:56:41.022972Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
Plex-configured Seerr instances vulnerable to unauthenticated account registration via Jellyfin authentication endpoint
Details

Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. Starting in version 2.0.0 and prior to version 3.1.0, an authentication guard logic flaw in POST /api/v1/auth/jellyfin allows an unauthenticated attacker to register a new Seerr account on any Plex-configured instance by authenticating with an attacker-controlled Jellyfin server. The attacker receives an authenticated session and can immediately use the application with default permissions, including the ability to submit media requests to Radarr/Sonarr. Any Seerr deployment where all three of the following are true may be vulnerable: settings.main.mediaServerType is set to PLEX (the most common deployment).; settings.jellyfin.ip is set to "" (default, meaning Jellyfin was never configured); and settings.main.newPlexLogin is set to true (default). Jellyfin-configured and Emby-configured deployments are not affected. Version 3.1.0 of Seerr fixes this issue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27707.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-288",
        "CWE-807"
    ]
}
References

Affected packages

Git / github.com/seerr-team/seerr

Affected ranges

Type
GIT
Repo
https://github.com/seerr-team/seerr
Events

Affected versions

v2.*
v2.0.0
v2.0.1
v2.1.0
v2.2.0
v2.2.1
v2.2.2
v2.2.3
v2.3.0
v2.4.0
v2.5.0
v2.5.1
v2.5.2
v2.6.0
v2.7.0
v2.7.1
v2.7.2
v2.7.3
v3.*
v3.0.0
v3.0.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27707.json"