Home

Description

The vulnerability exists in BLUVOYIX due to improper authentication in the BLUVOYIX admin APIs. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable admin API to create a new user with admin privileges. Successful exploitation of this vulnerability could allow the attacker to gain full access to customers' data and completely compromise the targeted platform by logging in to the newly-created admin user.

PUBLISHED Reserved 2026-01-06 | Published 2026-01-14 | Updated 2026-01-14 | Assigner MHV




CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/RE:H/U:Red

Problem types

CWE-306 Missing Authentication for Critical Function

CWE-269 Improper Privilege Management

Product status

Default status
unaffected

Any version
affected

Credits

The vulnerability was discovered by Eaton Zveare. finder

References

blusparkglobal.com/bluvoyix/

cve.org (CVE-2026-22238)

nvd.nist.gov (CVE-2026-22238)

Download JSON