Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1181: CWE-942 – Permissive Cross-domain Policy with Untrusted Domains in Altium Altium 365

0
Critical
VulnerabilityCVE-2026-1181cvecve-2026-1181cwe-942cwe-284
Published: Mon Jan 19 2026 (01/19/2026, 12:00:10 UTC)
Source: CVE Database V5
Vendor/Project: Altium
Product: Altium 365

Description

Altium 365 workspace endpoints were configured with an overly permissive Cross-Origin Resource Sharing (CORS) policy that allowed credentialed cross-origin requests from other Altium-controlled subdomains, including forum.live.altium.com. As a result, JavaScript executing on those origins could access authenticated workspace APIs in the context of a logged-in user. When chained with vulnerabilities in those external applications, this misconfiguration enables unauthorized access to workspace data, administrative actions, and bypass of IP allowlisting controls, including in GovCloud environments.

AI-Powered Analysis

AILast updated: 01/26/2026, 19:39:53 UTC

Technical Analysis

CVE-2026-1181 is a critical security vulnerability identified in Altium 365, a cloud-based workspace platform widely used for electronic design automation. The root cause is an overly permissive Cross-Origin Resource Sharing (CORS) configuration on Altium 365 workspace endpoints. Specifically, the CORS policy allows credentialed cross-origin requests from other subdomains controlled by Altium, including forum.live.altium.com. This means that JavaScript code executing on these trusted subdomains can make authenticated API calls to the workspace endpoints, inheriting the privileges of the logged-in user. The vulnerability is classified under CWE-942 (Permissive Cross-domain Policy with Untrusted Domains) and CWE-284 (Improper Access Control). The risk escalates when this permissive CORS policy is chained with vulnerabilities in the external applications hosted on these subdomains, enabling attackers to bypass IP allowlisting controls and perform unauthorized administrative actions. This is particularly concerning for GovCloud environments, which are designed for sensitive government data and require strict access controls. The vulnerability affects confidentiality by exposing sensitive workspace data, integrity by allowing unauthorized administrative changes, and availability by potentially disrupting workspace services. The CVSS v3.1 score of 9.0 reflects the critical nature of the vulnerability, with network attack vector, low attack complexity, required privileges, user interaction, and scope change. No public exploits have been reported yet, but the potential impact is severe.

Potential Impact

For European organizations, especially those in sectors such as aerospace, defense, government, and critical infrastructure that rely on Altium 365 for electronic design and collaboration, this vulnerability poses a significant risk. Unauthorized access to workspace data could lead to intellectual property theft, exposure of sensitive design documents, and compromise of proprietary information. Administrative control bypass could allow attackers to alter configurations, disrupt workflows, or exfiltrate data. The ability to bypass IP allowlisting undermines network perimeter defenses, increasing the attack surface. Organizations operating in regulated environments, including those complying with GDPR and other data protection laws, could face legal and financial repercussions if sensitive data is compromised. The presence of this vulnerability in GovCloud environments further elevates the risk for government contractors and agencies in Europe. Additionally, the trust model between subdomains is exploited, which may affect the overall security posture of organizations relying on integrated Altium services. The lack of known exploits in the wild suggests an opportunity for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

European organizations using Altium 365 should immediately audit and restrict the CORS policies on their workspace endpoints to only allow trusted origins with a strict validation mechanism, avoiding wildcard or broad subdomain allowances. They should verify and harden the security posture of all Altium-controlled subdomains, such as forum.live.altium.com, ensuring no additional vulnerabilities exist that could be chained with this issue. Implement Content Security Policy (CSP) headers to limit the execution of untrusted scripts. Review and tighten IP allowlisting configurations and consider additional network segmentation to reduce exposure. Employ multi-factor authentication and monitor API access logs for anomalous or unauthorized activities. Engage with Altium support or security advisories to obtain patches or updates once available. Conduct internal penetration testing focusing on cross-origin interactions and privilege escalation scenarios. Finally, educate users about the risks of interacting with potentially compromised subdomains and enforce least privilege principles for workspace access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Altium
Date Reserved
2026-01-19T11:47:00.514Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696e2305d302b072d9bca312

Added to database: 1/19/2026, 12:26:45 PM

Last enriched: 1/26/2026, 7:39:53 PM

Last updated: 2/6/2026, 10:41:38 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats