CVE-2026-29195
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with admin privileges to elevate their own account to super-admin status during user updates, potentially gaining full control over the system. This issue only affects versions prior to 1.5.0, so upgrading to the latest version is essential to mitigate the risk.
Technical Description
Netmaker makes networks with WireGuard. Prior to version 1.5.0, the user update handler (PUT /api/users/{username}) lacks validation to prevent an admin-role user from assigning the super-admin role during account updates. While the code correctly blocks an admin from assigning the admin role to another user, it does not include an equivalent check for the super-admin role. This issue has been patched in version 1.5.0.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 7, 2026
about 1 month ago
Last Modified
Mar 12, 2026
27 days ago
Vendor
gravitl
Product
netmaker
Related Vulnerabilities
An attacker with a specific user role can access and steal private keys for all WireGuard configurations in a network by using certain API calls, even though the user interface hides this information. This vulnerability exists in versions prior to 1.5.0, allowing unauthorized access to sensitive data without proper ownership checks.
This vulnerability allows an attacker to repeatedly shut down the Netmaker server, causing it to go offline for about three seconds each time, which can disrupt network services. Any user with access to the server can exploit this issue, making it a significant risk if not updated to version 1.2.0 or later.
This vulnerability allows an attacker to use a valid host token to access, modify, or delete resources belonging to other hosts in the Netmaker system. To exploit this, the attacker only needs to know the identifiers for the targeted nodes or hosts and can do so without proper authorization checks, making it a serious risk if not updated to the patched version.