Impact
The vulnerability is a CORS misconfiguration in the qui web interface, where versions 1.14.1 and below reflect arbitrary origins and return Access‑Control‑Allow‑Credentials: true. This allows any external webpage to send authenticated requests to the application using a victim’s session. An attacker can trick a logged‑in user into loading a malicious site, which then silently interacts with the interface, potentially extracting sensitive data such as API keys, account credentials, or executing commands through the built‑in External Programs manager. The weakness is identified as CWE‑942 (Improper Restriction of Operations within a Privilege Range).
Affected Systems
The affected product is the autobrr qui web interface for managing qBittorrent instances. Versions 1.14.1 and earlier are vulnerable; newer releases are not documented as affected.
Risk and Exploitability
The CVSS score is 9.0, indicating a critical severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the victim to be logged into the application via a non‑localhost hostname and to visit an attacker‑controlled webpage, making highly targeted social‑engineering attacks the most likely real‑world scenario. The potential impact includes theft of sensitive data and full system compromise through the External Programs manager.
OpenCVE Enrichment
Github GHSA