CVE-2026-4514
Improper Access Control in PbootCMS Backend Allows Remote Exploit
Publication date: 2026-03-21
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zzj-create | pbootcms | to 3.2.12 (inc) |
| pbootcms | pbootcms | to 3.2.12 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-4514 is a vulnerability in PbootCMS version 3.2.12 that allows an attacker to manipulate backend data by exploiting improper access controls in the UserController.php file. Specifically, the vulnerability arises from a backend quick-modification feature that accepts user-controlled "field" and "value" parameters to update user data without enforcing restrictions on which fields can be modified.'}, {'type': 'paragraph', 'content': 'Because the system does not enforce an allowlist of editable attributes, a lower-privileged administrator can modify sensitive fields such as password hashes of other administrator accounts. This can lead to unauthorized changes and potential administrative account takeover.'}, {'type': 'paragraph', 'content': 'The vulnerability is due to the direct use of the "field" parameter in update queries without proper validation or authorization checks, allowing attackers to bypass intended access controls.'}] [1]
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized modification of sensitive user attributes in the backend of PbootCMS, including the ability to change administrator passwords.
An attacker with lower privileges can exploit this flaw to perform horizontal privilege abuse by resetting passwords of other administrators, potentially taking over their accounts.
Such unauthorized access can compromise the integrity and security of the entire system, allowing attackers to gain administrative control and perform further malicious actions.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for suspicious HTTP requests targeting the backend quick-modification feature, specifically those that manipulate the "field" and "value" parameters in the UserController.php file.'}, {'type': 'paragraph', 'content': "An example of a suspicious request is a GET request like: /admin/User/mod?ucode=10002&field=password&value=14e1b600b1fd579f47433b88e8d85291 which attempts to reset an administrator's password."}, {'type': 'paragraph', 'content': 'To detect such attempts, you can use network monitoring tools or web server logs to search for requests containing the parameters "field" and "value" with unusual or sensitive field names such as "password".'}, {'type': 'paragraph', 'content': 'Example command using grep on web server logs:'}, {'type': 'list_item', 'content': "grep -i 'field=password' /var/log/nginx/access.log"}, {'type': 'list_item', 'content': "grep -i '/admin/User/mod' /var/log/apache2/access.log | grep -E 'field=|value='"}, {'type': 'paragraph', 'content': 'Additionally, you can use intrusion detection systems (IDS) or web application firewalls (WAF) to create rules that alert on or block requests attempting to modify sensitive fields via these parameters.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the vulnerable backend modification functionality and preventing unauthorized modification of sensitive fields.
- Implement an allowlist of editable fields on the server side to disallow arbitrary field names from client input.
- Add object-level and field-level authorization checks to ensure only authorized users can modify specific attributes.
- Monitor and block suspicious requests that attempt to modify sensitive fields such as passwords.
- If possible, temporarily disable or restrict access to the affected endpoint (/admin/User/mod) until a patch or fix is applied.
These steps help prevent unauthorized administrative account takeover and reduce the risk of exploitation.