Gravitl Vulnerabilities

Comprehensive security vulnerability database for Gravitl products

Last updated: Mar 7, 2026
Total CVEs

4

Critical

0

With Exploits

1

Last 30 Days

0

Severity Distribution

Critical0
0%
High3
75%
Medium1
25%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2026-291968.7

An attacker with a specific user role can access and steal private keys for all WireGuard configurations in a network by using certain API calls, even though the user interface hides this information. This vulnerability exists in versions prior to 1.5.0, allowing unauthorized access to sensitive data without proper ownership checks.

gravitlnetmaker
Theoretical
about 1 month agoMar 7, 2026
CVE-2026-291956.9

This vulnerability allows an attacker with admin privileges to elevate their own account to super-admin status during user updates, potentially gaining full control over the system. This issue only affects versions prior to 1.5.0, so upgrading to the latest version is essential to mitigate the risk.

gravitlnetmaker
Exploit Available
about 1 month agoMar 7, 2026
CVE-2026-297718.7

This vulnerability allows an attacker to repeatedly shut down the Netmaker server, causing it to go offline for about three seconds each time, which can disrupt network services. Any user with access to the server can exploit this issue, making it a significant risk if not updated to version 1.2.0 or later.

gravitlnetmaker
Theoretical
about 1 month agoMar 7, 2026
CVE-2026-291948.6

This vulnerability allows an attacker to use a valid host token to access, modify, or delete resources belonging to other hosts in the Netmaker system. To exploit this, the attacker only needs to know the identifiers for the targeted nodes or hosts and can do so without proper authorization checks, making it a serious risk if not updated to the patched version.

gravitlnetmaker
Theoretical
about 1 month agoMar 7, 2026

About Gravitl Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Gravitl products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.