CVE-2026-30689
Received Received - Intake
Improper Access Control in blog.admin getinfobytoken Exposes Admin Data

Publication date: 2026-03-27

Last updated on: 2026-04-02

Assigner: MITRE

Description
A blog.admin v.8.0 and before system's getinfobytoken API interface contains an improper access control which leads to sensitive data exposure. Unauthorized parties can obtain sensitive administrator account information via a valid token, threatening system security.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-27
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2026-03-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
anjoy8 blog.admin 8.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-30689 is a vulnerability in blog.admin version 8.0 and earlier where the getinfobytoken API endpoint improperly controls access to sensitive information.

An attacker who has a valid JSON Web Token (JWT) containing super administrator claims can access this API endpoint with the token as a URL parameter.

The API then returns the hashed password of the super administrator without any additional authentication or authorization checks.

This allows unauthorized parties to obtain sensitive administrator account information, which can be cracked offline to reveal the plaintext password.

Once the password is obtained, the attacker can log in with super administrator privileges, leading to a serious security breach.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized access to the backend system with super administrator privileges.

An attacker can obtain the hashed password of the super administrator and crack it offline to gain full control over the system.

This can lead to data breaches, unauthorized changes, and complete compromise of system security.

The exposure of sensitive administrator credentials threatens the confidentiality, integrity, and availability of the affected system.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unauthorized access attempts to the API endpoint `/api/user/getinfobytoken/` with a valid JWT token in the URL query parameter `token`.

A practical detection method is to check web server logs or network traffic for requests matching the pattern:

  • GET /api/user/getinfobytoken/?token=<valid_JWT_token>

You can use command-line tools like `grep` to search for such requests in your logs. For example:

  • grep "/api/user/getinfobytoken/" /var/log/nginx/access.log
  • tcpdump or Wireshark can be used to capture and analyze HTTP requests to detect suspicious API calls.

Additionally, inspecting the API responses for exposure of hashed passwords can confirm exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable API endpoint `/api/user/getinfobytoken/` to authorized users only.

Ensure that the API performs proper access control checks beyond just possession of a valid token, verifying user roles and permissions.

If possible, disable or remove the vulnerable API endpoint until a patch or update is applied.

Monitor and revoke any compromised tokens that may have been used to exploit this vulnerability.

Update to a fixed version of blog.admin once available or apply security patches provided by the vendor.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in blag.admin versions up to 8.0 allows unauthorized parties to access sensitive administrator account information, including the super administrator's password hash, via an API endpoint without proper authorization.

This exposure of sensitive data can lead to unauthorized access and privilege escalation, which compromises the confidentiality and integrity of the system.

Such a security flaw can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of sensitive data and implementation of proper access controls to prevent unauthorized data disclosure.

Failure to protect sensitive administrator credentials and prevent unauthorized access could result in violations of these regulations, potentially leading to legal and financial consequences.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart