diff --git a/http/misconfiguration/prowlarr-dashboard-unauth.yaml b/http/misconfiguration/prowlarr-dashboard-unauth.yaml
new file mode 100644
index 0000000000..ca162c723f
--- /dev/null
+++ b/http/misconfiguration/prowlarr-dashboard-unauth.yaml
@@ -0,0 +1,38 @@
+id: prowlarr-dashboard-unauth
+
+info:
+ name: Prowlarr Dashboard - Unauthenticated
+ author: ProjectDiscoveryAI
+ severity: medium
+ description: |
+ Exposure of Prowlarr dashboard which can lead to sensitive information disclosure.
+ metadata:
+ verified: true
+ max-request: 1
+ shodan-query: html:"
prowlarr"
+ tags: prowlarr,dashboard,unauth,misconfig
+
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}"
+
+ host-redirects: true
+ max-redirects: 2
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "Prowlarr"
+
+ - type: word
+ part: body
+ words:
+ - "Login - Prowlarr"
+ negative: true
+
+ - type: status
+ status:
+ - 200
diff --git a/prowlarr-general-settings.yaml b/prowlarr-general-settings.yaml
deleted file mode 100644
index a629ee0b2b..0000000000
--- a/prowlarr-general-settings.yaml
+++ /dev/null
@@ -1,25 +0,0 @@
-id: prowlarr-general-settings
-
-info:
- name: Prowlarr General Settings Exposure
- author: ProjectDiscoveryAI
- severity: medium
- description: |
- This template checks for exposed Prowlarr general settings which can lead to sensitive information disclosure.
-
-http:
- - raw:
- - |
- GET /prowlarr/settings/general HTTP/1.1
- Host: {{Hostname}}
-
- matchers-condition: and
- matchers:
- - type: status
- status:
- - 200
- - type: word
- words:
- - "Prowlarr"
- - "Settings"
- - "General"
\ No newline at end of file