Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27449: CWE-284: Improper Access Control in umbraco Umbraco.Engage.Forms

0
High
VulnerabilityCVE-2026-27449cvecve-2026-27449cwe-284cwe-306cwe-639
Published: Thu Feb 26 2026 (02/26/2026, 21:51:14 UTC)
Source: CVE Database V5
Vendor/Project: umbraco
Product: Umbraco.Engage.Forms

Description

Umbraco Engage is a business intelligence platform. A vulnerability has been identified in Umbraco Engage prior to versions 16.2.1 and 17.1.1 where certain API endpoints are exposed without enforcing authentication or authorization checks. The affected endpoints can be accessed directly over the network without requiring a valid session or user credentials. By supplying a user-controlled identifier parameter (e.g., ?id=), an attacker can retrieve sensitive data associated with arbitrary records. Because no access control validation is performed, the endpoints are vulnerable to enumeration attacks, allowing attackers to iterate over identifiers and extract data at scale. An unauthenticated attacker can retrieve sensitive Engage-related data by directly querying the affected API endpoints. The vulnerability allows arbitrary record access through predictable or enumerable identifiers. The confidentiality impact is considered high. No direct integrity or availability impact has been identified. The scope of exposed data depends on the deployment but may include analytics data, tracking data, customer-related information, or other Engage-managed content. The vulnerability affects both v16 and v17. Patches have already been released. Users are advised to update to 16.2.1 or 17.1.1. No known workarounds are available.

AI-Powered Analysis

AILast updated: 02/26/2026, 22:26:08 UTC

Technical Analysis

CVE-2026-27449 is an improper access control vulnerability (CWE-284) found in Umbraco Engage, a business intelligence platform, specifically in the Umbraco.Engage.Forms component. The flaw exists in certain API endpoints that fail to enforce authentication or authorization checks, allowing unauthenticated remote attackers to access sensitive data by directly querying these endpoints over the network. Attackers can supply a user-controlled identifier parameter (e.g., ?id=) to retrieve arbitrary records without any session or credential validation. This lack of access control enables enumeration attacks, where attackers iterate over possible identifiers to extract large volumes of sensitive data such as analytics, tracking information, or customer-related content managed by Engage. The vulnerability affects Umbraco Engage versions prior to 16.2.1 and versions from 17.0.0 up to but not including 17.1.1. Although the vulnerability does not impact data integrity or system availability, the confidentiality breach is significant. The CVSS v3.1 base score is 7.5, reflecting high severity due to network exploitability, no required privileges or user interaction, and high confidentiality impact. No known exploits have been reported in the wild yet. Patches have been released in versions 16.2.1 and 17.1.1, and no effective mitigations or workarounds are currently available, making timely patching critical.

Potential Impact

The primary impact of CVE-2026-27449 is a significant confidentiality breach. Organizations using vulnerable versions of Umbraco Engage risk unauthorized disclosure of sensitive business intelligence data, including analytics, tracking metrics, and customer-related information. Such data exposure can lead to competitive disadvantage, loss of customer trust, regulatory compliance violations (e.g., GDPR), and potential secondary attacks leveraging the disclosed information. Since the vulnerability allows unauthenticated remote access without user interaction, attackers can automate data extraction at scale, increasing the risk and speed of exploitation. Although integrity and availability are not directly affected, the confidentiality loss alone can have severe operational and reputational consequences. The scope of impact depends on the volume and sensitivity of data managed by the affected Umbraco Engage deployment. Enterprises relying heavily on this platform for business insights are particularly at risk.

Mitigation Recommendations

1. Immediate upgrade to Umbraco Engage versions 16.2.1 or 17.1.1 is the most effective mitigation to remediate the vulnerability. 2. Conduct a thorough audit of API endpoint exposure and ensure that all endpoints enforce strict authentication and authorization controls. 3. Implement network-level access restrictions such as IP whitelisting or VPN-only access to the Umbraco Engage management interfaces to reduce exposure. 4. Monitor API access logs for unusual or repetitive requests targeting identifier parameters that may indicate enumeration attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious API queries attempting to exploit this vulnerability. 6. Review and minimize the amount of sensitive data exposed via APIs, applying the principle of least privilege. 7. Educate development and operations teams on secure API design and the importance of access control validation. 8. If immediate patching is not feasible, consider temporarily disabling or restricting access to the vulnerable API endpoints, although no official workarounds exist. 9. Maintain an incident response plan to quickly address any detected data exfiltration or compromise related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-19T17:25:31.100Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0c5b685912abc710cd5cb

Added to database: 2/26/2026, 10:14:14 PM

Last enriched: 2/26/2026, 10:26:08 PM

Last updated: 2/27/2026, 3:26:10 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses