Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/autobrr/qui
  4. ›
  5. CVE-2026-30924

CVE-2026-30924: qui CORS Misconfiguration: Arbitrary Origins Trusted

March 19, 2026 (updated March 20, 2026)

The application implements an HTML5 cross-origin resource sharing (CORS) policy that allows access from any domain.

While the application is typically deployed within a trusted local network, successful exploitation of this weakness does not require any direct access to the instance by the attacker. Exploitation of this vulnerability uses the victim’s browser as a conduit for interaction with the application.

The mechanism used is a malicious webpage that requests from or posts to sensitive application paths upon load. This may be made transparent to the user, and harvested data may be sent back to the attacker upon success.

References

  • github.com/advisories/GHSA-h8vw-ph9r-xpch
  • github.com/autobrr/qui
  • github.com/autobrr/qui/commit/424f7a0de089dce881e8bbecd220163a78e0295f
  • github.com/autobrr/qui/security/advisories/GHSA-h8vw-ph9r-xpch
  • nvd.nist.gov/vuln/detail/CVE-2026-30924

Code Behaviors & Features

Detect and mitigate CVE-2026-30924 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.14.1

Solution

Unfortunately, there is no solution available yet.

Impact 9.6 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-942: Permissive Cross-domain Policy with Untrusted Domains

Source file

go/github.com/autobrr/qui/CVE-2026-30924.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:16:56 +0000.