Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27012: CWE-306: Missing Authentication for Critical Function in devcode-it openstamanager

0
Critical
VulnerabilityCVE-2026-27012cvecve-2026-27012cwe-306
Published: Tue Mar 03 2026 (03/03/2026, 21:53:01 UTC)
Source: CVE Database V5
Vendor/Project: devcode-it
Product: openstamanager

Description

CVE-2026-27012 is a critical vulnerability in OpenSTAManager versions 2. 9. 8 and earlier that allows unauthenticated attackers to bypass authentication and escalate privileges by manipulating user group assignments. Specifically, attackers can directly invoke the modules/utenti/actions. php endpoint to change a user's group ID, promoting themselves or others to the Amministratori (administrator) group or demoting existing administrators. This vulnerability results from missing authentication controls on a critical function (CWE-306). The CVSS 3. 1 base score is 9. 8, reflecting its ease of exploitation over the network without any privileges or user interaction, and its high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the severity and simplicity of exploitation make it a significant threat to organizations using OpenSTAManager for technical assistance and invoicing management.

AI-Powered Analysis

AILast updated: 03/04/2026, 02:17:39 UTC

Technical Analysis

OpenSTAManager is an open-source software used for managing technical assistance and invoicing. Versions 2.9.8 and earlier contain a critical security flaw identified as CVE-2026-27012, classified under CWE-306 (Missing Authentication for Critical Function). The vulnerability arises because the application fails to enforce authentication checks on the modules/utenti/actions.php endpoint, which handles user group modifications. An attacker can exploit this by directly sending crafted requests to this endpoint to arbitrarily change the 'idgruppo' parameter, effectively altering user group memberships without any authentication or authorization. This allows privilege escalation, enabling attackers to promote any existing user account to the Amministratori group, granting full administrative privileges, or demote legitimate administrators, disrupting administrative control. The vulnerability has a CVSS v3.1 score of 9.8 (critical), with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently known, the vulnerability's nature makes it highly exploitable and dangerous. The lack of authentication on a critical function is a fundamental security oversight, potentially leading to complete system compromise, data breaches, and operational disruption in environments relying on OpenSTAManager for business-critical processes.

Potential Impact

The impact of CVE-2026-27012 is severe for organizations using OpenSTAManager, as it allows unauthenticated attackers to gain administrative control over the system. This can lead to unauthorized access to sensitive customer and invoicing data, manipulation or deletion of records, disruption of business operations, and potential lateral movement within the network. The ability to demote legitimate administrators further exacerbates the risk by preventing proper incident response and recovery. Organizations may suffer data breaches, financial losses, reputational damage, and regulatory non-compliance consequences. Because the vulnerability requires no authentication or user interaction and can be exploited remotely, it poses a significant risk to any exposed OpenSTAManager installations, especially those accessible over the internet or untrusted networks. The critical nature of the vulnerability demands urgent attention to prevent exploitation and mitigate potential damage.

Mitigation Recommendations

1. Immediate upgrade: Organizations should upgrade OpenSTAManager to a version later than 2.9.8 once a patched release is available from the vendor. 2. Access restrictions: Until a patch is applied, restrict access to the modules/utenti/actions.php endpoint by implementing network-level controls such as IP whitelisting, VPN-only access, or firewall rules to limit exposure to trusted users only. 3. Web application firewall (WAF): Deploy a WAF with custom rules to detect and block unauthorized requests attempting to modify user groups via the vulnerable endpoint. 4. Monitoring and logging: Enable detailed logging of all requests to user management endpoints and monitor for suspicious activities, such as unexpected group changes or access attempts without proper authentication. 5. Incident response readiness: Prepare to respond quickly to any signs of compromise by having backup and recovery procedures in place and reviewing user group memberships regularly to detect unauthorized changes. 6. Code audit: Review the application source code for other missing authentication checks on critical functions to prevent similar vulnerabilities. 7. User education: Inform administrators and users about the vulnerability and encourage vigilance for unusual system behavior until the issue is resolved.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T03:08:23.489Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a79342d1a09e29cbc204f2

Added to database: 3/4/2026, 2:04:50 AM

Last enriched: 3/4/2026, 2:17:39 AM

Last updated: 3/4/2026, 7:01:39 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses