Cyber Posture

CVE-2026-30976

High

Published: 25 March 2026

Published
25 March 2026
Modified
09 April 2026
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0002 6.1th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30976 is a high-severity Path Traversal (CWE-22) vulnerability in Sonarr Sonarr. Its CVSS base score is 8.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the path traversal vulnerability by requiring validation of file path inputs to the Sonarr API, preventing access to arbitrary files outside the intended directory.

prevent

Enforces logical access controls to restrict API file serving to only the intended disk directory, addressing the lack of directory limitations in the vulnerable Sonarr versions.

prevent

Limits the Sonarr process privileges on Windows systems to the minimum necessary, reducing the scope of readable files even if path traversal succeeds.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Path traversal in exposed Sonarr instance enables remote unauthenticated exploitation of public-facing application (T1190); directly provides arbitrary file read access on the host, enabling data collection from local system (T1005) and retrieval of unsecured credentials from config files (T1552.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Sonarr is a PVR for Usenet and BitTorrent users. In versions on the 4.x branch prior to 4.0.17.2950, an unauthenticated remote attacker can potentially read any file readable by the Sonarr process. These include application configuration files (containing API keys…

more

and database credentials), Windows system files, and any user-accessible files on the same drive This issue only impacts Windows systems; macOS and Linux are unaffected. Files returned from the API were not limited to the directory on disk they were intended to be served from. This problem has been patched in 4.0.17.2950 in the nightly/develop branch or 4.0.17.2952 for stable/main releases. It's possible to work around the issue by only hosting Sonarr on a secure internal network and accessing it via VPN, Tailscale or similar solution outside that network.

Deeper analysisAI

CVE-2026-30976 is a path traversal vulnerability (CWE-22) in Sonarr, a PVR application for Usenet and BitTorrent users, affecting versions on the 4.x branch prior to 4.0.17.2950. The flaw occurs because files returned from the API are not restricted to the intended directory on disk, enabling an unauthenticated remote attacker to read any file accessible by the Sonarr process. This includes application configuration files containing API keys and database credentials, Windows system files, and any user-accessible files on the same drive. The issue is limited to Windows systems, with macOS and Linux unaffected.

An unauthenticated attacker with network access to a vulnerable Sonarr instance (CVSSv3.1 score of 8.6: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N) can exploit this vulnerability remotely without privileges or user interaction. Successful exploitation grants high-impact confidentiality violations, allowing arbitrary file reads that could expose sensitive credentials, system information, or other data readable by the process, potentially leading to lateral movement or further compromise within the environment.

The Sonarr security advisory (GHSA-h393-v5hm-6h8f) and release notes detail patches in version 4.0.17.2950 for the nightly/develop branch and 4.0.17.2952 for stable/main releases. As a workaround, administrators should host Sonarr on a secure internal network and restrict external access via VPN, Tailscale, or similar solutions until patching is feasible.

Details

CWE(s)

Affected Products

sonarr
sonarr
4.0.0.741 — 4.0.17.2950

CVEs Like This One

CVE-2026-30975Same product: Sonarr Sonarr
CVE-2026-3585Shared CWE-22
CVE-2026-26217Shared CWE-22
CVE-2026-30403Shared CWE-22
CVE-2026-28679Shared CWE-22
CVE-2026-30869Shared CWE-22
CVE-2026-33077Shared CWE-22
CVE-2026-35615Shared CWE-22
CVE-2025-10897Shared CWE-22
CVE-2026-1557Shared CWE-22

References