CVE-2026-35063
Received Received - Intake
Privilege Escalation via Insecure JWT Role Check in OpenPLC_V

Publication date: 2026-04-09

Last updated on: 2026-04-16

Assigner: ICS-CERT

Description
OpenPLC_V3 REST API endpoint checks for JWT presence but never verifies the caller's role. Any authenticated user with role=user can delete any other user, including administrators, by specifying their user ID or they can create new accounts with role=admin, escalating to full administrator access.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-16
Generated
2026-05-07
AI Q&A
2026-04-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openplcproject openplc_v3_firmware *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the OpenPLC_V3 REST API where the endpoint checks if a JSON Web Token (JWT) is present but does not verify the caller's role properly.

As a result, any authenticated user with the role 'user' can delete other users, including administrators, by specifying their user ID.

Additionally, such a user can create new accounts with the role 'admin', effectively escalating their privileges to full administrator access.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized deletion of user accounts, even those with administrative privileges.

It also allows privilege escalation by enabling a normal user to create new administrator accounts.

Such actions can lead to loss of control over the system, unauthorized access, potential data breaches, and disruption of normal operations.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows any authenticated user with a basic user role to delete other users, including administrators, or to create new administrator accounts, effectively escalating their privileges to full administrator access.

Such unauthorized privilege escalation and user account manipulation can lead to unauthorized access to sensitive data and critical system functions.

This situation can compromise compliance with common standards and regulations like GDPR and HIPAA, which require strict access controls, user authentication, and protection of sensitive data.

Failure to properly verify user roles and prevent unauthorized administrative actions may result in violations of these regulations, potentially leading to data breaches and legal consequences.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart