Anchorr XSS (CVE-2026-32890)
CVE-2026-32890
Attackers can steal every credential stored in Anchorr Discord bot by exploiting a stored XSS flaw. Unpatched versions 1.4.1 and below leak Discord tokens, API keys, and passwords. Upgrade to 1.4.2 immediately.
Patch now - CVE-2026-32890 is a critical stored XSS in Anchorr Discord bot versions 1.4.1 and below that lets any Discord user inject JavaScript to steal every credential, including Discord tokens and API keys, via an unauthenticated config endpoint. Upgrade to version 1.4.2 immediately.
Overview
A critical security vulnerability, tracked as CVE-2026-32890, has been discovered in the Anchorr Discord bot. Anchorr is used to request media and receive notifications from services like Jellyfin and Jellyseerr. The flaw allows attackers to steal every credential stored by the application.
Vulnerability Details
In versions 1.4.1 and below, the bot’s web dashboard contains a Stored Cross-Site Scripting (XSS) vulnerability. Specifically, the “User Mapping” dropdown feature does not properly sanitize user input. This allows any Discord user in the server (guild) where Anchorr is installed to inject malicious JavaScript code.
When an administrator views the dashboard, this code automatically executes in their browser. Attackers can chain this exploit with another insecure feature-an unauthenticated API endpoint (GET /api/config) that returns the bot’s entire configuration file in plaintext. By directing the admin’s browser to call this endpoint and send the data to an attacker-controlled server, all secrets can be stolen without any login to Anchorr itself.
Impact and Risks
The impact of this vulnerability is severe. Successful exploitation leads to a complete compromise of all credentials stored within Anchorr, including:
DISCORD_TOKEN(could allow takeover of the bot account)JELLYFIN_API_KEYJELLYSEERR_API_KEYJWT_SECRETWEBHOOK_SECRET- Bcrypt-hashed passwords
With these credentials, an attacker could gain unauthorized access to linked media servers, impersonate the bot, and potentially access other integrated systems. This type of credential leak is a common precursor to larger security incidents, as detailed in our breach reports.
Remediation and Mitigation
The only complete remediation is to immediately upgrade Anchorr to version 1.4.2 or later, which contains the fix. There is no effective workaround.
Action Steps:
- Update: Stop the bot and upgrade to version 1.4.2 without delay.
- Credential Rotation: As a precautionary measure, rotate all secrets exposed by the
/api/configendpoint. This includes generating new Discord tokens, API keys, and JWT secrets, and changing any associated passwords. - Monitor: Review logs for any suspicious activity prior to the update. Stay informed on similar vulnerabilities through our security news channel.
This vulnerability underscores the critical importance of input sanitization in web interfaces and securing API endpoints that handle sensitive configuration data.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job URL as part of JavaScript implementing validation of the feature "GitHub hook trigger for GITScm polling", resulting in a ...
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerab...
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerab...
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this issue by manipulating the DOM environment to execu...