CVE-2026-27792: CWE-862: Missing Authorization in seerr-team seerr
Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. A missing authorization vulnerability has been identified in the application starting in version 2.7.0 and prior to version 3.1.0. It allows authenticated users to access and modify data belonging to other users. This issue is due to the absence of the `isOwnProfileOrAdmin()` middleware on several push subscription API routes. Version 3.1.0 fixes the issue.
AI Analysis
Technical Summary
Seerr is an open-source media request and discovery manager designed to integrate with media servers like Jellyfin, Plex, and Emby. The vulnerability identified as CVE-2026-27792 is a missing authorization flaw classified under CWE-862. It affects Seerr versions starting from 2.7.0 up to but not including 3.1.0. The root cause is the absence of the isOwnProfileOrAdmin() middleware on several push subscription API endpoints, which are responsible for managing user-specific push notification subscriptions. Without this middleware, authenticated users can access and modify push subscription data belonging to other users, violating data confidentiality and integrity. The vulnerability requires authentication but no additional user interaction and can be exploited remotely over the network. The CVSS v3.1 base score is 5.4, reflecting a medium severity with low attack complexity and limited impact on confidentiality and integrity, and no impact on availability. The issue was publicly disclosed on February 27, 2026, and fixed in version 3.1.0 of Seerr. No known exploits are currently reported in the wild.
Potential Impact
The vulnerability allows authenticated users to bypass authorization controls and access or modify other users' push subscription data. This can lead to unauthorized disclosure of user preferences and potentially manipulation of notification settings, which may cause confusion or denial of legitimate notifications. While it does not directly impact system availability, the breach of data integrity and confidentiality can undermine user trust and privacy. For organizations relying on Seerr for media management and user requests, this could result in unauthorized data exposure and potential misuse of user accounts. The scope is limited to authenticated users, which reduces the risk from external attackers but still poses a significant insider threat or risk from compromised accounts. The impact is primarily on confidentiality and integrity, with no direct availability impact.
Mitigation Recommendations
The primary mitigation is to upgrade Seerr to version 3.1.0 or later, where the missing authorization checks are implemented. Until upgrade is possible, organizations should restrict access to the affected API endpoints by implementing additional access controls or network segmentation to limit authenticated user privileges. Conduct a thorough review of user roles and permissions to ensure least privilege principles are enforced. Monitoring and logging API access to detect anomalous behavior related to push subscription modifications is recommended. Additionally, consider implementing multi-factor authentication to reduce the risk of compromised accounts being used to exploit this vulnerability. Regularly audit and validate authorization middleware coverage on all user-specific API routes to prevent similar issues.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Sweden, Japan, South Korea
CVE-2026-27792: CWE-862: Missing Authorization in seerr-team seerr
Description
Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. A missing authorization vulnerability has been identified in the application starting in version 2.7.0 and prior to version 3.1.0. It allows authenticated users to access and modify data belonging to other users. This issue is due to the absence of the `isOwnProfileOrAdmin()` middleware on several push subscription API routes. Version 3.1.0 fixes the issue.
AI-Powered Analysis
Technical Analysis
Seerr is an open-source media request and discovery manager designed to integrate with media servers like Jellyfin, Plex, and Emby. The vulnerability identified as CVE-2026-27792 is a missing authorization flaw classified under CWE-862. It affects Seerr versions starting from 2.7.0 up to but not including 3.1.0. The root cause is the absence of the isOwnProfileOrAdmin() middleware on several push subscription API endpoints, which are responsible for managing user-specific push notification subscriptions. Without this middleware, authenticated users can access and modify push subscription data belonging to other users, violating data confidentiality and integrity. The vulnerability requires authentication but no additional user interaction and can be exploited remotely over the network. The CVSS v3.1 base score is 5.4, reflecting a medium severity with low attack complexity and limited impact on confidentiality and integrity, and no impact on availability. The issue was publicly disclosed on February 27, 2026, and fixed in version 3.1.0 of Seerr. No known exploits are currently reported in the wild.
Potential Impact
The vulnerability allows authenticated users to bypass authorization controls and access or modify other users' push subscription data. This can lead to unauthorized disclosure of user preferences and potentially manipulation of notification settings, which may cause confusion or denial of legitimate notifications. While it does not directly impact system availability, the breach of data integrity and confidentiality can undermine user trust and privacy. For organizations relying on Seerr for media management and user requests, this could result in unauthorized data exposure and potential misuse of user accounts. The scope is limited to authenticated users, which reduces the risk from external attackers but still poses a significant insider threat or risk from compromised accounts. The impact is primarily on confidentiality and integrity, with no direct availability impact.
Mitigation Recommendations
The primary mitigation is to upgrade Seerr to version 3.1.0 or later, where the missing authorization checks are implemented. Until upgrade is possible, organizations should restrict access to the affected API endpoints by implementing additional access controls or network segmentation to limit authenticated user privileges. Conduct a thorough review of user roles and permissions to ensure least privilege principles are enforced. Monitoring and logging API access to detect anomalous behavior related to push subscription modifications is recommended. Additionally, consider implementing multi-factor authentication to reduce the risk of compromised accounts being used to exploit this vulnerability. Regularly audit and validate authorization middleware coverage on all user-specific API routes to prevent similar issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-24T02:31:33.265Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a1f35732ffcdb8a26a7753
Added to database: 2/27/2026, 7:41:11 PM
Last enriched: 2/27/2026, 7:57:36 PM
Last updated: 2/28/2026, 5:52:37 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-29741: Elevation of privilege in Google Android
HighCVE-2026-28426: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in statamic cms
HighCVE-2025-11252: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Signum Technology Promotion and Training Inc. windesk.fm
CriticalCVE-2026-2647
UnknownCVE-2026-28425: CWE-94: Improper Control of Generation of Code ('Code Injection') in statamic cms
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.