CVE-2026-39401
Received Received - Intake
Authorization Bypass in Cronicle Allows Event Configuration Modification

Publication date: 2026-04-07

Last updated on: 2026-04-15

Assigner: GitHub, Inc.

Description
Cronicle is a multi-server task scheduler and runner, with a web based front-end UI. Prior to 0.9.111, jb child processes can include an update_event key in their JSON output. The server applies this directly to the parent event's stored configuration without any authorization check. A low-privilege user who can create and run events can modify any event property, including webhook URLs and notification emails. This vulnerability is fixed in 0.9.111.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-15
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cronicle cronicle to 0.9.111 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows a low-privilege user to modify event configurations, including webhook URLs and notification emails, without authorization. As a result, sensitive job data such as script contents, environment variables, and internal IP addresses can be exfiltrated to attacker-controlled endpoints.

Such unauthorized data exposure and modification can lead to violations of data protection regulations like GDPR and HIPAA, which require strict controls over access to and transmission of sensitive information.

Specifically, the ability to redirect notifications and webhooks to attacker-controlled servers could result in unauthorized disclosure of personal or protected health information, undermining compliance with confidentiality and integrity requirements mandated by these standards.


Can you explain this vulnerability to me?

This vulnerability exists in Cronicle, a multi-server task scheduler with a web-based UI. Before version 0.9.111, child processes (jb) could include an update_event key in their JSON output. The server would apply this update directly to the parent event's stored configuration without checking for authorization.

As a result, a low-privilege user who can create and run events could modify any property of any event, including sensitive fields like webhook URLs and notification emails.

This flaw allows unauthorized modification of event configurations, which is a security risk. The issue was fixed in version 0.9.111.


How can this vulnerability impact me? :

This vulnerability can allow a low-privilege user to alter event configurations without proper authorization.

  • Modification of webhook URLs could redirect event notifications to unauthorized endpoints.
  • Changing notification emails could result in sensitive information being sent to unintended recipients.

Such unauthorized changes could lead to information disclosure, disruption of scheduled tasks, or misuse of the system's notification mechanisms.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade Cronicle to version 0.9.111 or later, where the issue has been fixed.

Until the upgrade is applied, restrict low-privilege users from creating and running events to prevent unauthorized modification of event properties.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves identifying if any low-privilege user-created events are modifying event configurations via the `update_event` key in their JSON output. Since the vulnerability allows unauthorized updates to event properties such as webhook URLs and notification emails, monitoring for unexpected changes to these configurations can indicate exploitation.

You can check the Cronicle event configurations for suspicious or unauthorized modifications, especially changes to webhook URLs or notification email addresses.

Suggested commands or steps include:

  • Review event configuration files or database entries for unexpected changes to webhook URLs or notification emails.
  • Use grep or similar tools to search for the `update_event` key in job output logs or event definitions, for example: `grep -r 'update_event' /path/to/cronicle/jobs`.
  • Audit user permissions to identify low-privilege users who have the ability to create and run events.
  • Monitor network traffic for outbound connections to unexpected webhook URLs or external servers that could be receiving exfiltrated data.

Because the vulnerability involves JSON output from job child processes, inspecting logs or outputs for JSON containing the `update_event` key can help detect attempts to exploit this issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart