CVE-2026-32891
Published: 20 March 2026
Summary
CVE-2026-32891 is a critical-severity Basic XSS (CWE-80) vulnerability in Openvessl Anchorr. Its CVSS base score is 9.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique JavaScript (T1059.007); ranked at the 6.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates and sanitizes user inputs in the Jellyseerr user selector to block injection of malicious JavaScript payloads that enable stored XSS.
Filters and encodes information outputs when rendering the Jellyseerr user selector to prevent execution of injected JavaScript in the admin's browser session.
Requires timely remediation of the specific stored XSS flaw by upgrading Anchorr to version 1.4.2, eliminating the vulnerability in the Jellyseerr user selector.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stored XSS directly enables arbitrary JS execution in admin browser (T1059.007), facilitating browser session hijacking (T1185), web session token/cookie theft (T1539), and exposure of API keys/tokens from config (T1552).
NVD Description
Anchorr is a Discord bot for requesting movies and TV shows and receiving notifications when items are added to a media server. Versions 1.4.1 and below contain a stored XSS vulnerability in the Jellyseerr user selector. Jellyseerr allows any account…
more
holder to execute arbitrary JavaScript in the Anchorr admin's browser session. The injected script calls the authenticated /api/config endpoint - which returns the full application configuration in plaintext. This allows the attacker to forge a valid Anchorr session token and gain full admin access to the dashboard with no knowledge of the admin password. The same response also exposes the API keys and tokens for every integrated service, resulting in simultaneous account takeover of the Jellyfin media server (via JELLYFIN_API_KEY), the Jellyseerr request manager (via JELLYSEERR_API_KEY), and the Discord bot (via DISCORD_TOKEN). This issue has been fixed in version 1.4.2.
Deeper analysisAI
CVE-2026-32891 is a stored cross-site scripting (XSS) vulnerability, classified under CWE-80, CWE-212, and CWE-311, affecting Anchorr, a Discord bot for requesting movies and TV shows while providing notifications for additions to a media server. The flaw resides in the Jellyseerr user selector component in versions 1.4.1 and earlier. It enables arbitrary JavaScript execution within the browser session of an Anchorr administrator, triggered by the injected script calling the authenticated /api/config endpoint to retrieve the full application configuration in plaintext. The vulnerability carries a CVSS v3.1 base score of 9.0 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).
Any Anchorr account holder with low privileges can exploit this issue by injecting malicious JavaScript via the Jellyseerr user selector. Exploitation requires user interaction, as an administrator must view the affected selector for the script to execute in their browser context. Successful exploitation allows the attacker to forge a valid Anchorr session token, granting full unauthorized access to the admin dashboard without knowledge of the admin password. Additionally, the exposed configuration reveals API keys and tokens, enabling simultaneous account takeovers of the integrated Jellyfin media server (via JELLYFIN_API_KEY), Jellyseerr request manager (via JELLYSEERR_API_KEY), and the Discord bot (via DISCORD_TOKEN).
The issue has been addressed in Anchorr version 1.4.2, as detailed in the project's GitHub release notes and security advisory (GHSA-6mg4-788h-7g9g). Security practitioners should immediately upgrade to the patched version and review exposed configurations for potential compromise, particularly in environments integrating media servers and Discord bots.
Details
- CWE(s)