CVE-2026-27899
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2026-02-26

Last updated on: 2026-03-02

Assigner: GitHub, Inc.

Description
WireGuard Portal (or wg-portal) is a web-based configuration portal for WireGuard server management. Prior to version 2.1.3, any authenticated non-admin user can become a full administrator by sending a single PUT request to their own user profile endpoint with `"IsAdmin": true` in the JSON body. After logging out and back in, the session picks up admin privileges from the database. When a user updates their own profile, the server parses the full JSON body into the user model, including the `IsAdmin` boolean field. A function responsible for preserving calculated or protected attributes pins certain fields to their database values (such as base model data, linked peer count, and authentication data), but it does not do this for `IsAdmin`. As a result, whatever value the client sends for `IsAdmin` is written directly to the database. After the exploit, the attacker has full admin access to the WireGuard VPN management portal. The problem was fixed in v2.1.3. The docker images for the tag 'latest' built from the master branch also include the fix.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-26
Last Modified
2026-03-02
Generated
2026-05-07
AI Q&A
2026-02-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wgportal wireguard_portal to 2.1.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

Exploitation of this vulnerability grants an attacker full administrative control over the WireGuard VPN management portal. This includes the ability to read and modify all user accounts, create, modify, or delete WireGuard peers on any interface, view interface configurations, disable or lock other user accounts, and access all user API tokens.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-27899 is a privilege escalation vulnerability in WireGuard Portal (wg-portal) versions up to 2.1.2. It allows any authenticated non-admin user to become a full administrator by sending a single HTTP PUT request to their own user profile endpoint with the JSON field "IsAdmin": true. The server deserializes the entire JSON payload into the user model, including the IsAdmin boolean field, which is not protected during updates. As a result, the attacker can overwrite this field in the database, gaining full admin privileges after logging out and back in.'}] [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring HTTP PUT requests to the user profile endpoint of the WireGuard Portal (wg-portal) that include the JSON field "IsAdmin": true from non-admin authenticated users.'}, {'type': 'paragraph', 'content': 'Specifically, you can inspect web server logs or use network monitoring tools to identify such suspicious requests where a non-admin user attempts to escalate privileges by modifying their own profile.'}, {'type': 'paragraph', 'content': 'Example commands to detect such activity might include:'}, {'type': 'list_item', 'content': 'Using grep on web server logs to find PUT requests with "IsAdmin": true: grep \'PUT\' /var/log/nginx/access.log | grep \'IsAdmin": true\''}, {'type': 'list_item', 'content': 'Using tcpdump or Wireshark to capture HTTP traffic and filter for PUT requests containing "IsAdmin": true.'}, {'type': 'list_item', 'content': 'Using tools like curl or custom scripts to test if the endpoint accepts privilege escalation attempts (for authorized security testing only).'}] [1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'The immediate mitigation step is to upgrade the WireGuard Portal (wg-portal) to version 2.1.3 or later, where this vulnerability has been fixed.'}, {'type': 'paragraph', 'content': 'If upgrading immediately is not possible, restrict access to the user profile update endpoint to trusted administrators only or implement additional access controls to prevent non-admin users from sending PUT requests that modify the "IsAdmin" field.'}, {'type': 'paragraph', 'content': 'Additionally, review and monitor user accounts for any unauthorized privilege escalations and reset any accounts that may have been compromised.'}, {'type': 'paragraph', 'content': "Use the latest Docker images tagged 'latest' built from the master branch, as they include the fix."}] [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart