When you start the Anki desktop application, it automatically starts a web service called the mediasrv api.
That can be safe, so long as the service implements strict Origin checks.
Unfortunately, As of version 25.09.2, Anki does not check Origin at all, so the service will exposed to any website you visit.
Luckily, recent versions of Chrome implement a new security feature called PNA, which protects against attacks like this. As far as I know, no other browsers currently implement it, so Firefox and Safari users are likely affected.
This exploit was tested against Anki 25.09.2, on Windows 11 x64 with Firefox 150.
It might work against Safari or other browsers, but will need some tweaks.
This exploit asks you to manually start each stage so you can see what it's doing, but a
real attacker would run it automatically!
Please make sure Anki is running before testing!
This exploit probably doesn't work without prompts in recent Chrome because of PNA.
Please use the http version of this page, otherwise we need to open a window.
Click the "Scan" button to begin...
When a stage completes (✅), move on to the next one.
.