Impact
Anchorr, a Discord bot that manages media requests, has a stored cross‑site scripting flaw in its Jellyseerr user selector. The flaw lets any authenticated user inject JavaScript that executes in the browser session of an Anchorr administrator. The malicious script calls the /api/config endpoint, revealing the full application configuration, API keys, and tokens in plaintext. An attacker can use this data to forge an admin session token and take over the Anchorr dashboard, and simultaneously compromise the linked Jellyfin media server, Jellyseerr request manager, and Discord bot.
Affected Systems
The affected product is Anchorr, produced by openVESSL. Versions 1.4.1 and earlier contain the vulnerability. The fix was released in Anchorr 1.4.2, which removes the possibility to inject scripts into the Jellyseerr selector. Users running any version before 1.4.2 are at risk.
Risk and Exploitability
The CVSS score of 9.1 signals a high‑severity issue. However, the exploit probability is very low, with an EPSS of less than 1%, and the vulnerability is not yet listed in the CISA KEV catalog. Attackers need only a normal account on an Anchorr instance to inject the payload; no admin credentials are required. The impact is total loss of confidentiality, integrity, and availability for the entire platform and integrated services.
OpenCVE Enrichment