Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27899: CWE-269: Improper Privilege Management in h44z wg-portal

0
High
VulnerabilityCVE-2026-27899cvecve-2026-27899cwe-269cwe-863
Published: Thu Feb 26 2026 (02/26/2026, 00:50:00 UTC)
Source: CVE Database V5
Vendor/Project: h44z
Product: wg-portal

Description

WireGuard Portal (or wg-portal) is a web-based configuration portal for WireGuard server management. Prior to version 2.1.3, any authenticated non-admin user can become a full administrator by sending a single PUT request to their own user profile endpoint with `"IsAdmin": true` in the JSON body. After logging out and back in, the session picks up admin privileges from the database. When a user updates their own profile, the server parses the full JSON body into the user model, including the `IsAdmin` boolean field. A function responsible for preserving calculated or protected attributes pins certain fields to their database values (such as base model data, linked peer count, and authentication data), but it does not do this for `IsAdmin`. As a result, whatever value the client sends for `IsAdmin` is written directly to the database. After the exploit, the attacker has full admin access to the WireGuard VPN management portal. The problem was fixed in v2.1.3. The docker images for the tag 'latest' built from the master branch also include the fix.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:17:15 UTC

Technical Analysis

The vulnerability identified as CVE-2026-27899 affects wg-portal, a web-based configuration portal for WireGuard VPN server management developed by h44z. In versions prior to 2.1.3, the application improperly manages user privileges by failing to protect the 'IsAdmin' boolean field during user profile updates. When an authenticated non-admin user sends a PUT request to their own user profile endpoint with the JSON payload containing "IsAdmin": true, the server directly writes this value to the database without validation or restriction. Although some fields are pinned to their database values to prevent unauthorized changes, the 'IsAdmin' field is not protected, allowing privilege escalation. After the user logs out and back in, their session reflects the elevated admin privileges. This flaw is categorized under CWE-269 (Improper Privilege Management) and CWE-863 (Incorrect Authorization). The vulnerability allows attackers to gain full administrative access to the WireGuard portal, enabling them to alter VPN configurations, add or remove peers, and potentially disrupt or intercept VPN traffic. The vulnerability is remotely exploitable over the network without user interaction, requiring only authenticated access with non-admin credentials. The vendor fixed the issue in version 2.1.3, and the fix is included in the latest Docker images. No known exploits are reported in the wild yet, but the high CVSS score (8.8) indicates a significant risk.

Potential Impact

The impact of CVE-2026-27899 is severe for organizations relying on wg-portal for WireGuard VPN management. An attacker with any authenticated non-admin account can escalate privileges to full administrator, gaining unrestricted control over the VPN server configuration. This can lead to unauthorized creation or deletion of VPN peers, modification of routing rules, and potential interception or redirection of VPN traffic. Confidentiality is compromised as attackers can access sensitive network configurations and potentially decrypt or monitor VPN communications. Integrity is affected since attackers can alter VPN settings, potentially introducing backdoors or weakening security controls. Availability may also be impacted if attackers disrupt VPN services or lock out legitimate administrators. Given WireGuard's widespread adoption for secure remote access, this vulnerability poses a significant threat to enterprise networks, cloud environments, and any organization using wg-portal for VPN management. The ease of exploitation and lack of required user interaction increase the likelihood of exploitation once discovered by malicious actors.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade wg-portal to version 2.1.3 or later, where the privilege escalation flaw has been fixed. For deployments using Docker images, ensure that the 'latest' tag or images built from the master branch are used, as they include the patch. Additionally, implement strict access controls to limit the number of users with authenticated access to the portal, especially non-admin users. Monitor access logs for unusual PUT requests to user profile endpoints that attempt to modify privilege-related fields. Employ network segmentation to restrict access to the wg-portal interface to trusted management networks only. Consider implementing multi-factor authentication (MFA) for all users to reduce the risk of compromised credentials being used to exploit this vulnerability. Regularly audit user privileges and database records to detect unauthorized privilege escalations. Finally, maintain an incident response plan to quickly address any suspected compromise stemming from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T15:19:29.717Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699fa148b7ef31ef0b7796a0

Added to database: 2/26/2026, 1:26:32 AM

Last enriched: 3/5/2026, 11:17:15 AM

Last updated: 4/12/2026, 4:21:26 AM

Views: 219

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses