Vulnerability Description
Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. From 2.7.0 to 2.8.0, the /api/auth/login endpoint contains a logic flaw that allows unauthenticated remote attackers to enumerate valid usernames by measuring the application's response time. It appears that the hashing function, which is the most time-consuming part of the process by design, occurs as part of the VerifyPassword function. With the short circuits occurring before the hashing function, a timing differential is introduced that exposes validity to the actor. This vulnerability is fixed in 2.8.1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cleanuparr Project | Cleanuparr | >= 2.7.0, < 2.8.1 |
Related Weaknesses (CWE)
References
- https://github.com/Cleanuparr/Cleanuparr/security/advisories/GHSA-gjmf-m27r-2c9vExploitMitigationVendor Advisory
- https://github.com/Cleanuparr/Cleanuparr/security/advisories/GHSA-gjmf-m27r-2c9vExploitMitigationVendor Advisory
FAQ
What is CVE-2026-32702?
CVE-2026-32702 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. From 2.7.0 to 2.8.0, the /api/auth/login endpoint conta...
How severe is CVE-2026-32702?
CVE-2026-32702 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32702?
Check the references section above for vendor advisories and patch information. Affected products include: Cleanuparr Project Cleanuparr.