Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27198: CWE-269: Improper Privilege Management in getformwork formwork

0
High
VulnerabilityCVE-2026-27198cvecve-2026-27198cwe-269
Published: Sat Feb 21 2026 (02/21/2026, 05:11:42 UTC)
Source: CVE Database V5
Vendor/Project: getformwork
Product: formwork

Description

Formwork is a flat file-based Content Management System (CMS). In versions 2.0.0 through 2.3.3, the application fails to properly enforce role-based authorization during account creation. Although the system validates that the specified role exists, it does not verify whether the current user has sufficient privileges to assign highly privileged roles such as admin. As a result, an authenticated user with the editor role can create a new account with administrative privileges, leading to full administrative access and complete compromise of the CMS. This issue has been fixed in version 2.3.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 05:57:55 UTC

Technical Analysis

The vulnerability identified as CVE-2026-27198 affects the getformwork flat file-based CMS in versions 2.0.0 through 2.3.3. The core issue is improper privilege management (CWE-269) during the account creation process. While the system validates that the role assigned to a new account exists, it fails to verify if the requesting user has the authority to assign that role. Specifically, an authenticated user with the editor role can create new accounts with administrative privileges. This bypasses the intended role-based access control mechanisms, allowing privilege escalation to full administrative access. With admin rights, an attacker can manipulate site content, alter configurations, and potentially execute further attacks on the hosting environment. The vulnerability is remotely exploitable over the network without user interaction, requiring only authenticated editor-level access. The CVSS v3.1 score of 8.8 reflects its high impact on confidentiality, integrity, and availability, combined with low attack complexity and no user interaction. The issue was addressed in version 2.3.4 by enforcing proper authorization checks during role assignment in account creation.

Potential Impact

This vulnerability enables attackers with editor-level access to escalate privileges to full administrator rights, leading to complete compromise of the CMS. Potential impacts include unauthorized content modification, defacement, data leakage, and disruption of website availability. Attackers could also leverage admin privileges to implant malicious code or backdoors, threatening the hosting environment and connected systems. Organizations relying on getformwork CMS for their web presence face significant risks of reputational damage, data breaches, and operational disruption. Since the exploit requires only authenticated editor access, insider threats or compromised editor accounts pose a serious risk. The flat file nature of the CMS may simplify exploitation and persistence. Although no known exploits are reported in the wild yet, the high severity and ease of exploitation make this a critical risk for affected users.

Mitigation Recommendations

Immediate upgrade to getformwork version 2.3.4 or later is the primary mitigation to ensure proper role-based authorization enforcement. Until upgrade is possible, restrict editor role assignments and monitor editor accounts closely for suspicious activity. Implement strong authentication and session management to reduce risk of editor account compromise. Conduct audits of existing user accounts to identify and remove any unauthorized admin accounts created via this vulnerability. Employ web application firewalls (WAFs) with custom rules to detect and block anomalous account creation requests if feasible. Educate administrators and users about the risk of privilege escalation and enforce the principle of least privilege. Regularly review CMS logs for unusual account creation or privilege changes. Consider isolating the CMS environment and limiting network exposure to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-18T19:47:02.155Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699a1a4cbe58cf853b44c9ee

Added to database: 2/21/2026, 8:49:16 PM

Last enriched: 3/1/2026, 5:57:55 AM

Last updated: 4/8/2026, 9:09:26 AM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses