CVE-2026-34184
Received Received - Intake
Authorization Bypass in Hydrosystem Allows Remote PHP Execution

Publication date: 2026-04-09

Last updated on: 2026-04-20

Assigner: CERT.PL

Description
Hydrosystem Control System does not enforce authorization for some directories. This allows an unauthorized attacker to read all files in these directories and even execute some of them. Critically the attacker could run PHP scripts directly on the connected database.This issue was fixed inΒ Hydrosystem Control System versionΒ 9.8.5
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-20
Generated
2026-05-07
AI Q&A
2026-04-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
hydrosystem.poznan control_system to 9.8.5 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the Hydrosystem Control System (CVE-2026-34184) is due to missing authorization enforcement on certain directories. This means unauthorized attackers can access and read all files in these directories.

More critically, attackers can execute some of these files, including running PHP scripts directly on the connected database, which can lead to serious security risks.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in Hydrosystem Control System allows unauthorized attackers to read and execute files, including PHP scripts that interact with the database. This unauthorized access and potential data manipulation pose significant risks to data confidentiality and integrity.

Such unauthorized access to sensitive data and the ability to execute scripts on the database could lead to violations of common standards and regulations like GDPR and HIPAA, which require strict controls on data access and protection of personal and sensitive information.

Therefore, this vulnerability could negatively impact compliance by exposing sensitive data and allowing unauthorized operations, which are typically prohibited under these regulations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves missing authorization enforcement on certain directories in Hydrosystem Control System versions below 9.8.5, allowing unauthorized reading and execution of files, including PHP scripts.

To detect this vulnerability on your system, you should verify the version of the Hydrosystem Control System installed and check for unauthorized access to sensitive directories.

Suggested commands include:

  • Check the installed version of Hydrosystem Control System to confirm if it is below 9.8.5.
  • Use network monitoring tools to detect unusual HTTP requests targeting directories that should require authorization.
  • Attempt to access and execute PHP scripts in the suspected directories to verify if authorization is enforced.
  • Example command to check version (replace with actual command depending on system): `hydrosystem_control_system --version`
  • Example command to test unauthorized file access via curl: `curl -v http://<target>/path/to/directory/file.php`

How can this vulnerability impact me? :

This vulnerability allows unauthorized attackers to read sensitive files and execute scripts on the system without permission.

By running PHP scripts directly on the connected database, attackers could manipulate or compromise the database, potentially leading to data breaches, data loss, or unauthorized data modification.

Overall, it poses a high risk to the confidentiality, integrity, and availability of the system and its data.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the vulnerability CVE-2026-34184 in the Hydrosystem Control System, you should upgrade the software to version 9.8.5 or later, as this version contains the fix for the missing authorization enforcement issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart