Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27181: Missing Authorization in sergejey MajorDoMo

0
High
VulnerabilityCVE-2026-27181cvecve-2026-27181
Published: Wed Feb 18 2026 (02/18/2026, 21:10:41 UTC)
Source: CVE Database V5
Vendor/Project: sergejey
Product: MajorDoMo

Description

MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation through the market module. The market module's admin() method reads gr('mode') from $_REQUEST and assigns it to $this->mode at the start of execution, making all mode-gated code paths reachable without authentication via the /objects/?module=market endpoint. The uninstall mode handler calls uninstallPlugin(), which deletes module records from the database, executes the module's uninstall() method via eval(), recursively deletes the module's directory and template files using removeTree(), and removes associated cycle scripts. An attacker can iterate through module names and wipe the entire MajorDoMo installation with a series of unauthenticated GET requests.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:25:59 UTC

Technical Analysis

CVE-2026-27181 is a critical authorization bypass vulnerability affecting MajorDoMo, an open-source home automation platform developed by sergejey. The vulnerability exists in the market module's admin() method, which reads the 'mode' parameter from HTTP requests ($_REQUEST['mode']) and assigns it to an internal variable without verifying the user's authentication or authorization status. This flaw allows unauthenticated users to access all mode-gated code paths, including the uninstall functionality. Specifically, when the 'mode' parameter is set to 'uninstall', the uninstallPlugin() method is invoked. This method performs several destructive actions: it deletes module records from the database, executes the module's uninstall() method via eval(), recursively deletes the module's directory and template files using removeTree(), and removes associated cycle scripts. Because the endpoint is accessible via unauthenticated GET requests to /objects/?module=market, an attacker can iterate over module names and systematically uninstall modules, effectively wiping the entire MajorDoMo installation. The vulnerability requires no privileges, no user interaction, and can be exploited remotely over the network. The CVSS 4.0 base score is 8.7, reflecting high impact on availability and integrity with low attack complexity and no authentication required. No known exploits in the wild have been reported yet, but the potential damage is severe. The affected version is listed as '0', indicating early or all versions prior to patching are vulnerable. No official patch links are currently available, emphasizing the need for immediate attention from users and vendors.

Potential Impact

The impact of CVE-2026-27181 is significant for organizations using MajorDoMo for home or building automation. Successful exploitation results in complete loss of installed modules, which can disrupt automation workflows, disable critical smart home functions, and cause operational downtime. The integrity of the system is compromised as attackers can delete database records and execute arbitrary uninstall scripts. Availability is severely affected since the entire MajorDoMo installation can be wiped remotely without any authentication. This can lead to costly recovery efforts, loss of data, and potential safety risks if automation controls are disabled unexpectedly. For enterprises or service providers managing multiple MajorDoMo instances, the risk multiplies as attackers could automate attacks to cause widespread disruption. Although no known exploits are reported in the wild yet, the ease of exploitation and high impact make this vulnerability a prime target for attackers. The lack of authentication and user interaction requirements broadens the attack surface, increasing the likelihood of exploitation in exposed environments.

Mitigation Recommendations

To mitigate CVE-2026-27181, organizations should immediately restrict network access to the /objects/?module=market endpoint, ideally limiting it to trusted internal networks or VPNs. Implementing web application firewalls (WAFs) with custom rules to block unauthenticated requests containing the 'mode=uninstall' parameter can provide a temporary protective measure. Users should monitor logs for suspicious GET requests targeting the market module and the uninstall mode. Until an official patch is released, consider disabling the market module if feasible or applying code-level fixes to enforce strict authentication and authorization checks before processing the 'mode' parameter. Developers should refactor the admin() method to validate user credentials and permissions before allowing any mode-gated operations, especially destructive ones like uninstall. Regular backups of MajorDoMo configurations and modules are critical to enable recovery in case of successful exploitation. Finally, stay alert for vendor advisories and apply patches promptly once available to fully remediate the vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-18T15:22:30.054Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69962e786aea4a407ae9220d

Added to database: 2/18/2026, 9:26:16 PM

Last enriched: 3/5/2026, 9:25:59 AM

Last updated: 4/5/2026, 7:47:48 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses