Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27449: CWE-284: Improper Access Control in umbraco Umbraco.Engage.Forms

0
High
VulnerabilityCVE-2026-27449cvecve-2026-27449cwe-284cwe-306cwe-639
Published: Thu Feb 26 2026 (02/26/2026, 21:51:14 UTC)
Source: CVE Database V5
Vendor/Project: umbraco
Product: Umbraco.Engage.Forms

Description

Umbraco Engage is a business intelligence platform. A vulnerability has been identified in Umbraco Engage prior to versions 16.2.1 and 17.1.1 where certain API endpoints are exposed without enforcing authentication or authorization checks. The affected endpoints can be accessed directly over the network without requiring a valid session or user credentials. By supplying a user-controlled identifier parameter (e.g., ?id=), an attacker can retrieve sensitive data associated with arbitrary records. Because no access control validation is performed, the endpoints are vulnerable to enumeration attacks, allowing attackers to iterate over identifiers and extract data at scale. An unauthenticated attacker can retrieve sensitive Engage-related data by directly querying the affected API endpoints. The vulnerability allows arbitrary record access through predictable or enumerable identifiers. The confidentiality impact is considered high. No direct integrity or availability impact has been identified. The scope of exposed data depends on the deployment but may include analytics data, tracking data, customer-related information, or other Engage-managed content. The vulnerability affects both v16 and v17. Patches have already been released. Users are advised to update to 16.2.1 or 17.1.1. No known workarounds are available.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 21:26:33 UTC

Technical Analysis

The vulnerability identified as CVE-2026-27449 affects Umbraco Engage, a business intelligence platform, specifically the Umbraco.Engage.Forms component. Versions prior to 16.2.1 and between 17.0.0 and 17.1.0 inclusive expose certain API endpoints without enforcing any authentication or authorization checks. These endpoints accept a user-controlled identifier parameter (e.g., ?id=) that allows an attacker to query arbitrary records directly over the network. Because there is no access control validation, attackers can perform enumeration attacks by iterating over possible identifiers to extract sensitive data at scale. The exposed data may include analytics, tracking information, customer-related data, or other content managed by Engage, depending on the deployment context. The vulnerability does not affect data integrity or availability but poses a significant confidentiality risk. The flaw stems from improper access control (CWE-284), lack of authentication (CWE-306), and insecure direct object references (CWE-639). The vulnerability is remotely exploitable without any privileges or user interaction, making it highly accessible to attackers. Although no known exploits are currently in the wild, the risk remains substantial due to the nature of the exposed data and ease of exploitation. Patches have been released in versions 16.2.1 and 17.1.1, and users are strongly advised to upgrade. No known mitigations or workarounds exist aside from patching.

Potential Impact

This vulnerability primarily impacts the confidentiality of sensitive data managed by Umbraco Engage. Organizations using affected versions risk unauthorized disclosure of analytics, tracking, and customer-related information, which could lead to privacy violations, competitive intelligence leaks, or regulatory compliance issues such as GDPR or CCPA breaches. The ability to enumerate and extract data at scale increases the potential damage. Although there is no direct impact on data integrity or availability, the exposure of sensitive business intelligence data can undermine trust and cause reputational damage. The ease of exploitation without authentication or user interaction means attackers can operate stealthily and remotely, increasing the likelihood of exploitation. Enterprises relying on Umbraco Engage for customer insights or analytics are particularly vulnerable. The absence of workarounds means patching is the only effective mitigation, making timely updates critical to reduce risk.

Mitigation Recommendations

1. Immediately upgrade Umbraco Engage to version 16.2.1 or 17.1.1 or later to apply the official patches that enforce proper authentication and authorization on the affected API endpoints. 2. Conduct a thorough audit of API endpoint configurations to ensure no other endpoints are exposed without proper access controls. 3. Implement network-level protections such as IP whitelisting or VPN access to restrict access to the Engage platform's management interfaces and APIs. 4. Monitor API access logs for unusual patterns indicative of enumeration attacks, such as sequential or high-volume requests to identifier parameters. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious API requests targeting the vulnerable endpoints. 6. Review and enhance overall access control policies and authentication mechanisms within the Engage deployment to prevent similar issues. 7. Educate development and operations teams about secure API design principles, emphasizing the importance of enforcing authentication and authorization on all endpoints. 8. Plan for regular vulnerability assessments and penetration tests focusing on API security to identify and remediate access control weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-19T17:25:31.100Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0c5b685912abc710cd5cb

Added to database: 2/26/2026, 10:14:14 PM

Last enriched: 3/6/2026, 9:26:33 PM

Last updated: 4/13/2026, 7:33:15 AM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses