Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27792: CWE-862: Missing Authorization in seerr-team seerr

0
Medium
VulnerabilityCVE-2026-27792cvecve-2026-27792cwe-862
Published: Fri Feb 27 2026 (02/27/2026, 19:33:18 UTC)
Source: CVE Database V5
Vendor/Project: seerr-team
Product: seerr

Description

Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. A missing authorization vulnerability has been identified in the application starting in version 2.7.0 and prior to version 3.1.0. It allows authenticated users to access and modify data belonging to other users. This issue is due to the absence of the `isOwnProfileOrAdmin()` middleware on several push subscription API routes. Version 3.1.0 fixes the issue.

AI-Powered Analysis

AILast updated: 02/27/2026, 19:57:36 UTC

Technical Analysis

Seerr is an open-source media request and discovery manager designed to integrate with media servers like Jellyfin, Plex, and Emby. The vulnerability identified as CVE-2026-27792 is a missing authorization flaw classified under CWE-862. It affects Seerr versions starting from 2.7.0 up to but not including 3.1.0. The root cause is the absence of the isOwnProfileOrAdmin() middleware on several push subscription API endpoints, which are responsible for managing user-specific push notification subscriptions. Without this middleware, authenticated users can access and modify push subscription data belonging to other users, violating data confidentiality and integrity. The vulnerability requires authentication but no additional user interaction and can be exploited remotely over the network. The CVSS v3.1 base score is 5.4, reflecting a medium severity with low attack complexity and limited impact on confidentiality and integrity, and no impact on availability. The issue was publicly disclosed on February 27, 2026, and fixed in version 3.1.0 of Seerr. No known exploits are currently reported in the wild.

Potential Impact

The vulnerability allows authenticated users to bypass authorization controls and access or modify other users' push subscription data. This can lead to unauthorized disclosure of user preferences and potentially manipulation of notification settings, which may cause confusion or denial of legitimate notifications. While it does not directly impact system availability, the breach of data integrity and confidentiality can undermine user trust and privacy. For organizations relying on Seerr for media management and user requests, this could result in unauthorized data exposure and potential misuse of user accounts. The scope is limited to authenticated users, which reduces the risk from external attackers but still poses a significant insider threat or risk from compromised accounts. The impact is primarily on confidentiality and integrity, with no direct availability impact.

Mitigation Recommendations

The primary mitigation is to upgrade Seerr to version 3.1.0 or later, where the missing authorization checks are implemented. Until upgrade is possible, organizations should restrict access to the affected API endpoints by implementing additional access controls or network segmentation to limit authenticated user privileges. Conduct a thorough review of user roles and permissions to ensure least privilege principles are enforced. Monitoring and logging API access to detect anomalous behavior related to push subscription modifications is recommended. Additionally, consider implementing multi-factor authentication to reduce the risk of compromised accounts being used to exploit this vulnerability. Regularly audit and validate authorization middleware coverage on all user-specific API routes to prevent similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:31:33.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1f35732ffcdb8a26a7753

Added to database: 2/27/2026, 7:41:11 PM

Last enriched: 2/27/2026, 7:57:36 PM

Last updated: 2/28/2026, 5:52:37 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses