CVE-2026-26069
📋 TL;DR
Scraparr versions 3.0.0-beta through 3.0.1 expose Readarr API keys in Prometheus metrics when Readarr integration is enabled without an alias. This allows attackers to steal API keys if the /metrics endpoint is publicly accessible. Only users with Readarr scraping enabled, no alias configured, and externally accessible endpoints are affected.
💻 Affected Systems
- Scraparr
📦 What is this software?
Scraparr by Thecfu
⚠️ Risk & Real-World Impact
Worst Case
Attackers obtain Readarr API key, gain unauthorized access to Readarr instance, potentially compromising media management system and associated services.
Likely Case
API key exposure leading to unauthorized Readarr access, allowing manipulation of media libraries or configuration changes.
If Mitigated
No impact if /metrics endpoint is properly firewalled or authentication is required.
🎯 Exploit Status
Exploitation requires access to /metrics endpoint and knowledge of metric structure.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.0.2
Vendor Advisory: https://github.com/thecfu/scraparr/security/advisories/GHSA-hx24-222f-w5cj
Restart Required: Yes
Instructions:
1. Stop Scraparr service. 2. Update to version 3.0.2 via package manager or manual download. 3. Restart Scraparr service.
🔧 Temporary Workarounds
Disable Readarr Integration
allTemporarily disable Readarr scraping in Scraparr configuration
Edit scraparr config file and set readarr.enabled: false
Restrict /metrics Endpoint
linuxConfigure firewall or reverse proxy to block external access to /metrics endpoint
iptables -A INPUT -p tcp --dport 8080 -s ! 192.168.1.0/24 -j DROP
🧯 If You Can't Patch
- Configure alias for Readarr metrics to mask API key
- Implement authentication or IP whitelisting for /metrics endpoint
🔍 How to Verify
Check if Vulnerable:
Access /metrics endpoint and search for 'readarr_api_key' or similar metric labels containing API key values.
Check Version:
scraparr --version or check service status output
Verify Fix Applied:
After patching, verify /metrics endpoint no longer exposes API keys in metric labels.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to /metrics endpoint
- Unusual Readarr API activity
Network Indicators:
- External requests to /metrics endpoint
- Traffic patterns suggesting metric scraping
SIEM Query:
source="scraparr.log" AND (uri="/metrics" OR message="*api_key*")