Browse all 3 CVE security advisories affecting Sonarr. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Sonarr is a PVR application for managing Usenet and BitTV downloads, automating TV series collection. Historically, it has faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and authentication flaws. The application's web interface and API have been common attack vectors. While no major public security incidents have been widely documented, the three recorded CVEs highlight ongoing risks in its attack surface. Regular updates and secure configuration are recommended due to its exposure to network threats and potential for unauthorized access or system compromise.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-30976 | Sonarr Path Traversal vulnerability — SonarrCWE-22 | 8.6 | High | 2026-03-25 |
| CVE-2026-30975 | Sonarr Authentication Bypass vulnerability — SonarrCWE-290 | 8.1 | High | 2026-03-25 |
| CVE-2024-45247 | Sonarr – CWE-601: URL Redirection to Untrusted Site ('Open Redirect') — SonarrCWE-601 | 6.1 | Medium | 2024-10-06 |
This page lists every published CVE security advisory associated with Sonarr. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.