CVE-2026-4514
Received Received - Intake
Improper Access Control in PbootCMS Backend Allows Remote Exploit

Publication date: 2026-03-21

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in PbootCMS up to 3.2.12. Affected by this issue is some unknown functionality of the file apps/admin/controller/system/UserController.php of the component Backend. Executing a manipulation of the argument Field can lead to improper access controls. The attack may be performed from remote. The exploit has been published and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-21
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
zzj-create pbootcms to 3.2.12 (inc)
pbootcms pbootcms to 3.2.12 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-4514 is a vulnerability in PbootCMS version 3.2.12 that allows an attacker to manipulate backend data by exploiting improper access controls in the UserController.php file. Specifically, the vulnerability arises from a backend quick-modification feature that accepts user-controlled "field" and "value" parameters to update user data without enforcing restrictions on which fields can be modified.'}, {'type': 'paragraph', 'content': 'Because the system does not enforce an allowlist of editable attributes, a lower-privileged administrator can modify sensitive fields such as password hashes of other administrator accounts. This can lead to unauthorized changes and potential administrative account takeover.'}, {'type': 'paragraph', 'content': 'The vulnerability is due to the direct use of the "field" parameter in update queries without proper validation or authorization checks, allowing attackers to bypass intended access controls.'}] [1]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized modification of sensitive user attributes in the backend of PbootCMS, including the ability to change administrator passwords.

An attacker with lower privileges can exploit this flaw to perform horizontal privilege abuse by resetting passwords of other administrators, potentially taking over their accounts.

Such unauthorized access can compromise the integrity and security of the entire system, allowing attackers to gain administrative control and perform further malicious actions.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for suspicious HTTP requests targeting the backend quick-modification feature, specifically those that manipulate the "field" and "value" parameters in the UserController.php file.'}, {'type': 'paragraph', 'content': "An example of a suspicious request is a GET request like: /admin/User/mod?ucode=10002&field=password&value=14e1b600b1fd579f47433b88e8d85291 which attempts to reset an administrator's password."}, {'type': 'paragraph', 'content': 'To detect such attempts, you can use network monitoring tools or web server logs to search for requests containing the parameters "field" and "value" with unusual or sensitive field names such as "password".'}, {'type': 'paragraph', 'content': 'Example command using grep on web server logs:'}, {'type': 'list_item', 'content': "grep -i 'field=password' /var/log/nginx/access.log"}, {'type': 'list_item', 'content': "grep -i '/admin/User/mod' /var/log/apache2/access.log | grep -E 'field=|value='"}, {'type': 'paragraph', 'content': 'Additionally, you can use intrusion detection systems (IDS) or web application firewalls (WAF) to create rules that alert on or block requests attempting to modify sensitive fields via these parameters.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable backend modification functionality and preventing unauthorized modification of sensitive fields.

  • Implement an allowlist of editable fields on the server side to disallow arbitrary field names from client input.
  • Add object-level and field-level authorization checks to ensure only authorized users can modify specific attributes.
  • Monitor and block suspicious requests that attempt to modify sensitive fields such as passwords.
  • If possible, temporarily disable or restrict access to the affected endpoint (/admin/User/mod) until a patch or fix is applied.

These steps help prevent unauthorized administrative account takeover and reduce the risk of exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart