Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/autobrr/qui
  4. ›
  5. CVE-2026-30924

CVE-2026-30924: qui CORS Misconfiguration: Arbitrary Origins Trusted

March 19, 2026 (updated April 27, 2026)

The application implements an HTML5 cross-origin resource sharing (CORS) policy that allows access from any domain.

While the application is typically deployed within a trusted local network, successful exploitation of this weakness does not require any direct access to the instance by the attacker. Exploitation of this vulnerability uses the victim’s browser as a conduit for interaction with the application.

The mechanism used is a malicious webpage that requests from or posts to sensitive application paths upon load. This may be made transparent to the user, and harvested data may be sent back to the attacker upon success.

References

  • github.com/advisories/GHSA-h8vw-ph9r-xpch
  • github.com/autobrr/qui
  • github.com/autobrr/qui/commit/424f7a0de089dce881e8bbecd220163a78e0295f
  • github.com/autobrr/qui/security/advisories/GHSA-h8vw-ph9r-xpch
  • nvd.nist.gov/vuln/detail/CVE-2026-30924

Code Behaviors & Features

Detect and mitigate CVE-2026-30924 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.15.0

Fixed versions

  • 1.15.0

Solution

Upgrade to version 1.15.0 or above.

Impact 9.6 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-942: Permissive Cross-domain Policy with Untrusted Domains

Source file

go/github.com/autobrr/qui/CVE-2026-30924.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:17:57 +0000.