4
0
1
0
Vulnerability Timeline
4 vulnerabilities discovered over time for Netmaker
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-29196 | 8.7 | An attacker with a specific user role can access and steal private keys for all WireGuard configurations in a network by using certain API calls, even though the user interface hides this information. This vulnerability exists in versions prior to 1.5.0, allowing unauthorized access to sensitive data without proper ownership checks. | gravitlnetmaker | Theoretical | about 1 month agoMar 7, 2026 |
| CVE-2026-29195 | 6.9 | This vulnerability allows an attacker with admin privileges to elevate their own account to super-admin status during user updates, potentially gaining full control over the system. This issue only affects versions prior to 1.5.0, so upgrading to the latest version is essential to mitigate the risk. | gravitlnetmaker | Exploit Available | about 1 month agoMar 7, 2026 |
| CVE-2026-29771 | 8.7 | This vulnerability allows an attacker to repeatedly shut down the Netmaker server, causing it to go offline for about three seconds each time, which can disrupt network services. Any user with access to the server can exploit this issue, making it a significant risk if not updated to version 1.2.0 or later. | gravitlnetmaker | Theoretical | about 1 month agoMar 7, 2026 |
| CVE-2026-29194 | 8.6 | This vulnerability allows an attacker to use a valid host token to access, modify, or delete resources belonging to other hosts in the Netmaker system. To exploit this, the attacker only needs to know the identifiers for the targeted nodes or hosts and can do so without proper authorization checks, making it a serious risk if not updated to the patched version. | gravitlnetmaker | Theoretical | about 1 month agoMar 7, 2026 |
About Gravitl Netmaker Security
This page provides comprehensive security vulnerability tracking for Gravitl Netmaker. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Netmaker updated to the latest version
- • Subscribe to security advisories from Gravitl
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately