Description
Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. From 2.7.0 to 2.8.0, the /api/auth/login endpoint contains a logic flaw that allows unauthenticated remote attackers to enumerate valid usernames by measuring the application's response time. It appears that the hashing function, which is the most time-consuming part of the process by design, occurs as part of the VerifyPassword function. With the short circuits occurring before the hashing function, a timing differential is introduced that exposes validity to the actor. This vulnerability is fixed in 2.8.1.
Published: 2026-03-13
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Username Enumeration
Action: Patch
AI Analysis

Impact

The flaw resides in the /api/auth/login endpoint of Cleanuparr between versions 2.7.0 and 2.8.0. The VerifyPassword function performs the most time‑consuming work, but short‑circuits occur before hashing when the supplied username is invalid. This timing differential allows an unauthenticated attacker to infer whether a username exists by measuring response times, resulting in information disclosure rather than direct code execution or denial of service. The weakness is classified as CWE-208 (Timing Channel).

Affected Systems

Affected vendors of the vulnerability are Cleanuparr:Cleanuparr, specifically the Cleanuparr Project. The impacted versions are 2.7.0 through 2.8.0, as indicated by the vulnerability description. The relevant component is the /api/auth/login endpoint, accessed via the API exposed by the Cleanuparr application.

Risk and Exploitability

The CVSS score for this vulnerability is 6.9, indicating a moderate severity. The EPSS score is less than 1 % and the issue is not listed in the CISA KEV catalog, suggesting that exploitation is unlikely in the wild but not impossible. The attack requires an attacker who can send unauthenticated requests to the public API endpoint and perform precise timing measurements, which is technically feasible for a network‑connected attacker. The resulting impact is the exposure of valid usernames, enabling attackers to focus subsequent credential‑guessing or social‑engineering attacks.

Generated by OpenCVE AI on March 18, 2026 at 19:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch that upgrades Cleanuparr to version 2.8.1 or later.

Generated by OpenCVE AI on March 18, 2026 at 19:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Cleanuparr Project
Cleanuparr Project cleanuparr
CPEs cpe:2.3:a:cleanuparr_project:cleanuparr:*:*:*:*:*:*:*:*
Vendors & Products Cleanuparr Project
Cleanuparr Project cleanuparr
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Mon, 16 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cleanuparr
Cleanuparr cleanuparr
Vendors & Products Cleanuparr
Cleanuparr cleanuparr

Fri, 13 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
Description Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. From 2.7.0 to 2.8.0, the /api/auth/login endpoint contains a logic flaw that allows unauthenticated remote attackers to enumerate valid usernames by measuring the application's response time. It appears that the hashing function, which is the most time-consuming part of the process by design, occurs as part of the VerifyPassword function. With the short circuits occurring before the hashing function, a timing differential is introduced that exposes validity to the actor. This vulnerability is fixed in 2.8.1.
Title Cleanuparr has Username Enumeration via Timing Attack
Weaknesses CWE-208
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Cleanuparr Cleanuparr
Cleanuparr Project Cleanuparr
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-16T16:47:53.284Z

Reserved: 2026-03-13T14:33:42.823Z

Link: CVE-2026-32702

cve-icon Vulnrichment

Updated: 2026-03-16T16:47:42.330Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:41.087

Modified: 2026-03-18T18:19:19.683

Link: CVE-2026-32702

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:39:27Z

Weaknesses