CVE-2026-26069: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in thecfu scraparr
Scraparr is a Prometheus Exporter for various components of the *arr Suite. From 3.0.0-beta to before 3.0.2, when the Readarr integration was enabled, the exporter exposed the configured Readarr API key as the alias metric label value. Users were affected only if all of the following conditions are met, Readarr scraping feature was enabled and no alias configured, the exporter’s /metrics endpoint was accessible to external or unauthorized users, and the Readarr instance is externally accessible. If the /metrics endpoint was publicly accessible, the Readarr API key could have been disclosed via exported metrics data. This vulnerability is fixed in 3.0.2.
AI Analysis
Technical Summary
CVE-2026-26069 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Scraparr, a Prometheus exporter for the *arr suite of media management tools. Specifically, from versions 3.0.0-beta up to but not including 3.0.2, when the Readarr integration feature is enabled and no alias is configured, Scraparr exposes the configured Readarr API key as a label value in the exported Prometheus metrics. This exposure occurs via the /metrics HTTP endpoint, which is designed for monitoring but inadvertently leaks sensitive credentials if accessible externally or by unauthorized users. The vulnerability requires that the Readarr scraping feature is enabled, no alias is set, the /metrics endpoint is reachable by attackers, and the Readarr instance itself is externally accessible. The API key disclosure can lead to unauthorized access to Readarr’s API, enabling attackers to manipulate or extract data from the Readarr service. The vulnerability is remotely exploitable without authentication or user interaction, making it highly dangerous. The issue was addressed and fixed in Scraparr version 3.0.2. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack traceability (AT:P), no privileges required (PR:N), no user interaction (UI:N), high confidentiality impact (VC:H), no integrity or availability impact, and high scope impact (SI:H), with low security requirements (SA:L). No known exploits are reported in the wild as of now.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of the Readarr API key, which is a sensitive credential granting access to Readarr’s API. An attacker obtaining this key can potentially perform unauthorized operations such as querying, modifying, or deleting data managed by Readarr, leading to data confidentiality breaches and operational disruptions. Since the API key is exposed via a monitoring endpoint, attackers can automate the extraction without needing authentication or user interaction, increasing the risk of widespread exploitation if the endpoint is publicly accessible. This can lead to lateral movement within networks, data leakage, and compromise of media management infrastructure. Organizations relying on Scraparr and Readarr for media automation and management may face operational downtime, loss of data integrity, and privacy violations. The critical CVSS score reflects the high severity and ease of exploitation. The scope of affected systems includes any deployments of Scraparr versions 3.0.0-beta to before 3.0.2 with Readarr integration enabled and improperly secured /metrics endpoints.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Scraparr to version 3.0.2 or later where the issue is fixed. Until upgrading, restrict access to the /metrics endpoint by implementing network-level controls such as firewall rules, VPN access, or IP whitelisting to ensure it is not accessible externally or by unauthorized users. Configure an alias for the Readarr integration in Scraparr to avoid exposing the API key as a label value. Regularly audit and monitor access logs to detect any unauthorized access attempts to the /metrics endpoint. Rotate the Readarr API key if exposure is suspected or confirmed to prevent misuse. Employ network segmentation to isolate monitoring endpoints from public networks. Additionally, review and harden Readarr instance accessibility to prevent external exposure. Implement monitoring and alerting on unusual API activity to detect potential exploitation attempts early. Finally, educate administrators on secure configuration practices for monitoring tools and API integrations.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Sweden, Japan, South Korea
CVE-2026-26069: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in thecfu scraparr
Description
Scraparr is a Prometheus Exporter for various components of the *arr Suite. From 3.0.0-beta to before 3.0.2, when the Readarr integration was enabled, the exporter exposed the configured Readarr API key as the alias metric label value. Users were affected only if all of the following conditions are met, Readarr scraping feature was enabled and no alias configured, the exporter’s /metrics endpoint was accessible to external or unauthorized users, and the Readarr instance is externally accessible. If the /metrics endpoint was publicly accessible, the Readarr API key could have been disclosed via exported metrics data. This vulnerability is fixed in 3.0.2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-26069 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Scraparr, a Prometheus exporter for the *arr suite of media management tools. Specifically, from versions 3.0.0-beta up to but not including 3.0.2, when the Readarr integration feature is enabled and no alias is configured, Scraparr exposes the configured Readarr API key as a label value in the exported Prometheus metrics. This exposure occurs via the /metrics HTTP endpoint, which is designed for monitoring but inadvertently leaks sensitive credentials if accessible externally or by unauthorized users. The vulnerability requires that the Readarr scraping feature is enabled, no alias is set, the /metrics endpoint is reachable by attackers, and the Readarr instance itself is externally accessible. The API key disclosure can lead to unauthorized access to Readarr’s API, enabling attackers to manipulate or extract data from the Readarr service. The vulnerability is remotely exploitable without authentication or user interaction, making it highly dangerous. The issue was addressed and fixed in Scraparr version 3.0.2. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack traceability (AT:P), no privileges required (PR:N), no user interaction (UI:N), high confidentiality impact (VC:H), no integrity or availability impact, and high scope impact (SI:H), with low security requirements (SA:L). No known exploits are reported in the wild as of now.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of the Readarr API key, which is a sensitive credential granting access to Readarr’s API. An attacker obtaining this key can potentially perform unauthorized operations such as querying, modifying, or deleting data managed by Readarr, leading to data confidentiality breaches and operational disruptions. Since the API key is exposed via a monitoring endpoint, attackers can automate the extraction without needing authentication or user interaction, increasing the risk of widespread exploitation if the endpoint is publicly accessible. This can lead to lateral movement within networks, data leakage, and compromise of media management infrastructure. Organizations relying on Scraparr and Readarr for media automation and management may face operational downtime, loss of data integrity, and privacy violations. The critical CVSS score reflects the high severity and ease of exploitation. The scope of affected systems includes any deployments of Scraparr versions 3.0.0-beta to before 3.0.2 with Readarr integration enabled and improperly secured /metrics endpoints.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Scraparr to version 3.0.2 or later where the issue is fixed. Until upgrading, restrict access to the /metrics endpoint by implementing network-level controls such as firewall rules, VPN access, or IP whitelisting to ensure it is not accessible externally or by unauthorized users. Configure an alias for the Readarr integration in Scraparr to avoid exposing the API key as a label value. Regularly audit and monitor access logs to detect any unauthorized access attempts to the /metrics endpoint. Rotate the Readarr API key if exposure is suspected or confirmed to prevent misuse. Employ network segmentation to isolate monitoring endpoints from public networks. Additionally, review and harden Readarr instance accessibility to prevent external exposure. Implement monitoring and alerting on unusual API activity to detect potential exploitation attempts early. Finally, educate administrators on secure configuration practices for monitoring tools and API integrations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-10T18:01:31.901Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698e4ad9c9e1ff5ad81db30f
Added to database: 2/12/2026, 9:49:13 PM
Last enriched: 2/20/2026, 9:05:35 AM
Last updated: 3/30/2026, 4:40:54 AM
Views: 149
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.