Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32890: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in openVESSL Anchorr

0
Critical
VulnerabilityCVE-2026-32890cvecve-2026-32890cwe-79cwe-200
Published: Fri Mar 20 2026 (03/20/2026, 02:35:22 UTC)
Source: CVE Database V5
Vendor/Project: openVESSL
Product: Anchorr

Description

CVE-2026-32890 is a critical stored Cross-site Scripting (XSS) vulnerability in the Anchorr Discord bot versions 1. 4. 1 and below. It allows any unprivileged Discord user in the configured guild to execute arbitrary JavaScript in the admin's browser via the web dashboard's User Mapping dropdown. By exploiting this XSS and chaining it with the unauthenticated GET /api/config endpoint, an attacker can exfiltrate all sensitive credentials stored in Anchorr, including Discord tokens, API keys, JWT secrets, webhook secrets, and password hashes. This vulnerability impacts confidentiality, integrity, and availability with a CVSS score of 9. 7. The issue has been fixed in version 1. 4. 2.

AI-Powered Analysis

AILast updated: 03/20/2026, 03:40:02 UTC

Technical Analysis

Anchorr is a Discord bot designed to facilitate media requests and notifications for movies and TV shows. Versions 1.4.1 and earlier contain a stored Cross-site Scripting (XSS) vulnerability (CWE-79) in the web dashboard's User Mapping dropdown. This flaw allows any unprivileged Discord user within the configured guild to inject and execute arbitrary JavaScript code in the browser of an Anchorr administrator viewing the dashboard. The vulnerability is particularly severe because it can be chained with an unauthenticated API endpoint, GET /api/config, which returns all sensitive credentials in plaintext, including the Discord bot token, Jellyfin and Jellyseerr API keys, JWT secret, webhook secret, and bcrypt password hashes. Exploiting this chain enables attackers to fully compromise the Anchorr instance without needing direct authentication. The vulnerability affects the confidentiality, integrity, and availability of the system and its data. The vendor has addressed the issue in version 1.4.2 by sanitizing inputs and securing the API endpoint. No known exploits have been reported in the wild as of the publication date.

Potential Impact

The impact of CVE-2026-32890 is critical for organizations using Anchorr versions prior to 1.4.2. Successful exploitation allows attackers to execute arbitrary JavaScript in the admin's browser, leading to credential theft and full compromise of the bot's secrets. This can result in unauthorized access to the Discord bot account, media server APIs, and potentially other connected services. The attacker can manipulate or disrupt media server operations, impersonate the bot, and escalate privileges within the Discord guild. The exposure of JWT secrets and password hashes further increases the risk of lateral movement and persistent access. The vulnerability undermines confidentiality, integrity, and availability, potentially causing significant operational disruption and data breaches. Organizations relying on Anchorr for media management and notifications are at risk of service interruption and data compromise.

Mitigation Recommendations

1. Immediately upgrade Anchorr to version 1.4.2 or later, where the vulnerability is patched. 2. Restrict access to the Anchorr web dashboard to trusted administrators only, ideally limiting it via network controls or VPN. 3. Implement Content Security Policy (CSP) headers on the Anchorr web interface to mitigate the impact of potential XSS attacks. 4. Regularly audit and rotate all secrets stored in Anchorr, including Discord tokens, API keys, JWT secrets, and webhook secrets, especially if running vulnerable versions. 5. Monitor Discord guild activity and Anchorr logs for suspicious behavior indicative of exploitation attempts. 6. Educate administrators about the risks of clicking untrusted links or interacting with untrusted Discord users while logged into the Anchorr dashboard. 7. Consider isolating Anchorr instances in segmented environments to limit blast radius in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-16T21:03:44.422Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bcbde5e32a4fbe5f2545aa

Added to database: 3/20/2026, 3:24:21 AM

Last enriched: 3/20/2026, 3:40:02 AM

Last updated: 3/20/2026, 6:56:46 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses