CVE-2026-42571
Received Received - Intake
Privilege Escalation in Pelican WebUI

Publication date: 2026-05-09

Last updated on: 2026-05-09

Assigner: GitHub, Inc.

Description
Pelican is a platform for creating data federations. From versions 7.21.0 to before 7.21.5, 7.22.0 to before 7.22.3, 7.23.0 to before 7.23.3, and 7.24.0 to before 7.24.2, there is a a privilege escalation vulnerability affecting Pelican's Web User Interface (WebUI). This attack allows any user authenticated to the WebUI via OAuth to gain admin privileges under certain configurations. This issue has been patched in versions 7.21.5, 7.22.3, 7.23.3, and 7.24.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-09
Last Modified
2026-05-09
Generated
2026-05-10
AI Q&A
2026-05-09
EPSS Evaluated
N/A
NVD
Affected Vendors & Products
Showing 8 associated CPEs
Vendor Product Version / Range
pelicanplatform pelican From 7.21.0 (inc) to 7.21.5 (exc)
pelicanplatform pelican From 7.22.0 (inc) to 7.22.3 (exc)
pelicanplatform pelican From 7.23.0 (inc) to 7.23.3 (exc)
pelicanplatform pelican From 7.24.0 (inc) to 7.24.2 (exc)
pelicanplatform pelican From 7.21.0 (inc) to 7.21.4 (inc)
pelicanplatform pelican From 7.22.0 (inc) to 7.22.2 (inc)
pelicanplatform pelican From 7.23.0 (inc) to 7.23.2 (inc)
pelicanplatform pelican From 7.24.0 (inc) to 7.24.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-42571 is a critical privilege escalation vulnerability in the Pelican platform's Web User Interface (WebUI). It affects versions from 7.21.0 to before 7.21.5, 7.22.0 to before 7.22.3, 7.23.0 to before 7.23.3, and 7.24.0 to before 7.24.2.

The vulnerability allows any user authenticated via OAuth to the WebUI to gain admin privileges under certain server configurations, such as when specific admin user or group settings are enabled but those admins or groups have not logged in before.

An attacker can exploit this flaw by creating database records that grant themselves admin rights, enabling them to modify server configurations, create persistent API tokens, and change admin passwords.


How can this vulnerability impact me? :

This vulnerability can have severe impacts because it allows an authenticated user to escalate their privileges to admin level.

  • Modification of server configurations by unauthorized users.
  • Creation of persistent API tokens that could be used for further unauthorized access.
  • Changing admin passwords, potentially locking out legitimate administrators.

Overall, it compromises the confidentiality, integrity, and availability of the affected system and potentially other connected systems.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

To detect this vulnerability on your system, you should audit the Pelican database for signs of exploitation. The Pelican security advisory mentions using a provided script to check for unauthorized privilege escalations where users have gained admin rights improperly.

Since the vulnerability involves OAuth-authenticated users gaining admin privileges by creating database records, inspecting the database for unexpected admin users or groups is critical.

Specific commands are not detailed in the provided resources, but typical detection steps would include querying the Pelican database for admin user entries and reviewing server configuration settings such as `Server.UIAdminUsers` and `Server.AdminGroups`.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading Pelican to one of the patched versions: 7.21.5, 7.22.3, 7.23.3, or 7.24.2.

If upgrading is not immediately possible, you should disable the vulnerable configurations such as `Server.UIAdminUsers` and `Server.AdminGroups` to prevent exploitation.

Additionally, audit the database for signs of exploitation using the provided script to identify any unauthorized privilege escalations.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The privilege escalation vulnerability in Pelican's Web UI allows any authenticated user via OAuth to gain admin privileges under certain configurations. This can lead to unauthorized modification of server configurations, creation of persistent API tokens, and changes to admin passwords, which significantly impacts confidentiality, integrity, and availability of the system.

Such unauthorized access and control could result in non-compliance with common standards and regulations like GDPR and HIPAA, which require strict access controls and protection of sensitive data. The ability for an attacker to escalate privileges and potentially access or alter sensitive information undermines these compliance requirements.

Immediate mitigation steps include auditing for exploitation, upgrading to patched versions, or disabling vulnerable configurations, which are critical to restoring compliance and reducing risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart