CVE-2026-8077
Authorization Bypass in CashDro 3 Web Panel
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cashdro | cashdro_3 | 24.01.00.26 |
| cashdro | cashdro_3 | 26.01.00.16 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the CashDro 3 web administration panel, version 24.01.00.26, due to a lack of proper authorization controls on the backend. Instead of enforcing security server-side, the system relies solely on frontend controls. An attacker can manipulate the 'Permissions' field in the JSON response by modifying a binary string, which allows them to escalate their privileges and gain full administrative access.
As a result, all restrictions can be bypassed, completely compromising the system's management capabilities.
How can this vulnerability impact me? :
Exploiting this vulnerability allows an attacker to gain full administrative access to the CashDro 3 system without proper authorization.
- Bypass all security restrictions and controls.
- Manipulate system management functions, potentially leading to unauthorized cash withdrawals or configuration changes.
- Compromise the integrity and security of cash-handling operations.
Additionally, the lack of network access control and weak authentication mechanisms (such as weak or default PINs without brute-force protection) increase the risk of unauthorized access.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by identifying the presence of the CashDro 3 device on your network and testing for weak authentication and authorization controls.
First, scan your network for exposed ports that the CashDro device might be using, especially those accessible without Network Access Control (NAC).
- Use network scanning tools like nmap to detect open ports and identify the CashDro device: nmap -p- --open -sV <target-ip-range>
- Attempt to authenticate using default or weak numeric PINs such as '1234' to check for weak authentication.
- Inspect API responses from the web administration panel for the 'Permissions' field in JSON responses. Modify the binary string in this field to test if privilege escalation is possible due to lack of server-side authorization.
These steps help confirm if the backend lacks proper authorization controls, allowing privilege escalation by manipulating permission data.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting network access to the CashDro 3 device and improving authentication mechanisms.
- Implement network segmentation and Network Access Control (NAC) to prevent unauthorized access to the CashDro device.
- Change default or weak numeric PINs to strong, unique credentials if possible.
- Disable or restrict access to the web administration panel from untrusted networks.
Ultimately, update the CashDro 3 device to the fixed version 26.01.00.16, which addresses weak PIN authentication and improves security controls.
Ensure physical security of the device to prevent direct network access and tampering.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in the CashDro 3 web administration panel allows attackers to bypass all authorization controls and gain full administrative access by manipulating permissions in the backend. This complete compromise of system management could lead to unauthorized access to sensitive data and system functions.
Such unauthorized access and privilege escalation can result in violations of common security requirements found in standards and regulations like GDPR and HIPAA, which mandate strict access controls and protection of sensitive data.
Failure to implement proper authorization controls and the resulting potential data breaches or unauthorized system changes could lead to non-compliance with these regulations, exposing organizations to legal and financial penalties.