CVE-2026-32890: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in openVESSL Anchorr
CVE-2026-32890 is a critical stored Cross-site Scripting (XSS) vulnerability in the Anchorr Discord bot versions 1. 4. 1 and below. It allows any unprivileged Discord user in the configured guild to execute arbitrary JavaScript in the admin's browser via the web dashboard's User Mapping dropdown. By exploiting this XSS and chaining it with the unauthenticated GET /api/config endpoint, an attacker can exfiltrate all sensitive credentials stored in Anchorr, including Discord tokens, API keys, JWT secrets, webhook secrets, and password hashes. This vulnerability impacts confidentiality, integrity, and availability with a CVSS score of 9. 7. The issue has been fixed in version 1. 4. 2.
AI Analysis
Technical Summary
Anchorr is a Discord bot designed to facilitate media requests and notifications for movies and TV shows. Versions 1.4.1 and earlier contain a stored Cross-site Scripting (XSS) vulnerability (CWE-79) in the web dashboard's User Mapping dropdown. This flaw allows any unprivileged Discord user within the configured guild to inject and execute arbitrary JavaScript code in the browser of an Anchorr administrator viewing the dashboard. The vulnerability is particularly severe because it can be chained with an unauthenticated API endpoint, GET /api/config, which returns all sensitive credentials in plaintext, including the Discord bot token, Jellyfin and Jellyseerr API keys, JWT secret, webhook secret, and bcrypt password hashes. Exploiting this chain enables attackers to fully compromise the Anchorr instance without needing direct authentication. The vulnerability affects the confidentiality, integrity, and availability of the system and its data. The vendor has addressed the issue in version 1.4.2 by sanitizing inputs and securing the API endpoint. No known exploits have been reported in the wild as of the publication date.
Potential Impact
The impact of CVE-2026-32890 is critical for organizations using Anchorr versions prior to 1.4.2. Successful exploitation allows attackers to execute arbitrary JavaScript in the admin's browser, leading to credential theft and full compromise of the bot's secrets. This can result in unauthorized access to the Discord bot account, media server APIs, and potentially other connected services. The attacker can manipulate or disrupt media server operations, impersonate the bot, and escalate privileges within the Discord guild. The exposure of JWT secrets and password hashes further increases the risk of lateral movement and persistent access. The vulnerability undermines confidentiality, integrity, and availability, potentially causing significant operational disruption and data breaches. Organizations relying on Anchorr for media management and notifications are at risk of service interruption and data compromise.
Mitigation Recommendations
1. Immediately upgrade Anchorr to version 1.4.2 or later, where the vulnerability is patched. 2. Restrict access to the Anchorr web dashboard to trusted administrators only, ideally limiting it via network controls or VPN. 3. Implement Content Security Policy (CSP) headers on the Anchorr web interface to mitigate the impact of potential XSS attacks. 4. Regularly audit and rotate all secrets stored in Anchorr, including Discord tokens, API keys, JWT secrets, and webhook secrets, especially if running vulnerable versions. 5. Monitor Discord guild activity and Anchorr logs for suspicious behavior indicative of exploitation attempts. 6. Educate administrators about the risks of clicking untrusted links or interacting with untrusted Discord users while logged into the Anchorr dashboard. 7. Consider isolating Anchorr instances in segmented environments to limit blast radius in case of compromise.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, Brazil, India
CVE-2026-32890: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in openVESSL Anchorr
Description
CVE-2026-32890 is a critical stored Cross-site Scripting (XSS) vulnerability in the Anchorr Discord bot versions 1. 4. 1 and below. It allows any unprivileged Discord user in the configured guild to execute arbitrary JavaScript in the admin's browser via the web dashboard's User Mapping dropdown. By exploiting this XSS and chaining it with the unauthenticated GET /api/config endpoint, an attacker can exfiltrate all sensitive credentials stored in Anchorr, including Discord tokens, API keys, JWT secrets, webhook secrets, and password hashes. This vulnerability impacts confidentiality, integrity, and availability with a CVSS score of 9. 7. The issue has been fixed in version 1. 4. 2.
AI-Powered Analysis
Technical Analysis
Anchorr is a Discord bot designed to facilitate media requests and notifications for movies and TV shows. Versions 1.4.1 and earlier contain a stored Cross-site Scripting (XSS) vulnerability (CWE-79) in the web dashboard's User Mapping dropdown. This flaw allows any unprivileged Discord user within the configured guild to inject and execute arbitrary JavaScript code in the browser of an Anchorr administrator viewing the dashboard. The vulnerability is particularly severe because it can be chained with an unauthenticated API endpoint, GET /api/config, which returns all sensitive credentials in plaintext, including the Discord bot token, Jellyfin and Jellyseerr API keys, JWT secret, webhook secret, and bcrypt password hashes. Exploiting this chain enables attackers to fully compromise the Anchorr instance without needing direct authentication. The vulnerability affects the confidentiality, integrity, and availability of the system and its data. The vendor has addressed the issue in version 1.4.2 by sanitizing inputs and securing the API endpoint. No known exploits have been reported in the wild as of the publication date.
Potential Impact
The impact of CVE-2026-32890 is critical for organizations using Anchorr versions prior to 1.4.2. Successful exploitation allows attackers to execute arbitrary JavaScript in the admin's browser, leading to credential theft and full compromise of the bot's secrets. This can result in unauthorized access to the Discord bot account, media server APIs, and potentially other connected services. The attacker can manipulate or disrupt media server operations, impersonate the bot, and escalate privileges within the Discord guild. The exposure of JWT secrets and password hashes further increases the risk of lateral movement and persistent access. The vulnerability undermines confidentiality, integrity, and availability, potentially causing significant operational disruption and data breaches. Organizations relying on Anchorr for media management and notifications are at risk of service interruption and data compromise.
Mitigation Recommendations
1. Immediately upgrade Anchorr to version 1.4.2 or later, where the vulnerability is patched. 2. Restrict access to the Anchorr web dashboard to trusted administrators only, ideally limiting it via network controls or VPN. 3. Implement Content Security Policy (CSP) headers on the Anchorr web interface to mitigate the impact of potential XSS attacks. 4. Regularly audit and rotate all secrets stored in Anchorr, including Discord tokens, API keys, JWT secrets, and webhook secrets, especially if running vulnerable versions. 5. Monitor Discord guild activity and Anchorr logs for suspicious behavior indicative of exploitation attempts. 6. Educate administrators about the risks of clicking untrusted links or interacting with untrusted Discord users while logged into the Anchorr dashboard. 7. Consider isolating Anchorr instances in segmented environments to limit blast radius in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-16T21:03:44.422Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bcbde5e32a4fbe5f2545aa
Added to database: 3/20/2026, 3:24:21 AM
Last enriched: 3/20/2026, 3:40:02 AM
Last updated: 3/20/2026, 6:56:46 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.