


Perceptive Security
SOC/SIEM Consultancy

Sonarr is a PVR for Usenet and BitTorrent users. In versions on the 4.x branch prior to 4.0.17.2950, an unauthenticated remote attacker can potentially read any…
Published:
24 maart 2026 om 23:00:00
Alert date:
25 maart 2026 om 22:02:27
Source:
nvd.nist.gov
Operating Systems, Enterprise Applications
Sonarr PVR application versions on 4.x branch prior to 4.0.17.2950 contain a critical vulnerability allowing unauthenticated remote attackers to read arbitrary files on Windows systems. The vulnerability affects application configuration files containing API keys and database credentials, Windows system files, and user-accessible files. The issue stems from insufficient directory traversal protection in the API. Only Windows systems are affected, with macOS and Linux unaffected. Patches are available in versions 4.0.17.2950 for nightly/develop branch and 4.0.17.2952 for stable/main releases. Workarounds include restricting Sonarr to secure internal networks with VPN access.
Technical details
Mitigation steps:
Affected products:
Sonarr
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-30976
https://github.com/Sonarr/Sonarr/releases/tag/v4.0.17.2950
https://github.com/Sonarr/Sonarr/releases/tag/v4.0.17.2952
https://github.com/Sonarr/Sonarr/security/advisories/GHSA-h393-v5hm-6h8f
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
