Home

Description

An insecure direct object reference vulnerability in the Users API component of Crafty Controller allows a remote, authenticated attacker to perform user modification actions via improper API permissions validation.

PUBLISHED Reserved 2026-04-06 | Published 2026-04-21 | Updated 2026-04-21 | Assigner GitLab




CRITICAL: 9.0CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

Any version
affected

Credits

Thank you to [Kacper Leszczyński / szotgan](https://gitlab.com/szotgan) on GitLab for reporting this issue. finder

References

gitlab.com/crafty-controller/crafty-4/-/work_items/705 exploit

gitlab.com/crafty-controller/crafty-4/-/work_items/705

cve.org (CVE-2026-5652)

nvd.nist.gov (CVE-2026-5652)

Download JSON