CVE-2026-27899: CWE-269: Improper Privilege Management in h44z wg-portal
WireGuard Portal (or wg-portal) is a web-based configuration portal for WireGuard server management. Prior to version 2.1.3, any authenticated non-admin user can become a full administrator by sending a single PUT request to their own user profile endpoint with `"IsAdmin": true` in the JSON body. After logging out and back in, the session picks up admin privileges from the database. When a user updates their own profile, the server parses the full JSON body into the user model, including the `IsAdmin` boolean field. A function responsible for preserving calculated or protected attributes pins certain fields to their database values (such as base model data, linked peer count, and authentication data), but it does not do this for `IsAdmin`. As a result, whatever value the client sends for `IsAdmin` is written directly to the database. After the exploit, the attacker has full admin access to the WireGuard VPN management portal. The problem was fixed in v2.1.3. The docker images for the tag 'latest' built from the master branch also include the fix.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-27899 affects wg-portal, a web-based configuration portal for WireGuard VPN server management developed by h44z. In versions prior to 2.1.3, the application improperly manages user privileges by failing to protect the 'IsAdmin' boolean field during user profile updates. When an authenticated non-admin user sends a PUT request to their own user profile endpoint with the JSON payload containing "IsAdmin": true, the server directly writes this value to the database without validation or restriction. Although some fields are pinned to their database values to prevent unauthorized changes, the 'IsAdmin' field is not protected, allowing privilege escalation. After the user logs out and back in, their session reflects the elevated admin privileges. This flaw is categorized under CWE-269 (Improper Privilege Management) and CWE-863 (Incorrect Authorization). The vulnerability allows attackers to gain full administrative access to the WireGuard portal, enabling them to alter VPN configurations, add or remove peers, and potentially disrupt or intercept VPN traffic. The vulnerability is remotely exploitable over the network without user interaction, requiring only authenticated access with non-admin credentials. The vendor fixed the issue in version 2.1.3, and the fix is included in the latest Docker images. No known exploits are reported in the wild yet, but the high CVSS score (8.8) indicates a significant risk.
Potential Impact
The impact of CVE-2026-27899 is severe for organizations relying on wg-portal for WireGuard VPN management. An attacker with any authenticated non-admin account can escalate privileges to full administrator, gaining unrestricted control over the VPN server configuration. This can lead to unauthorized creation or deletion of VPN peers, modification of routing rules, and potential interception or redirection of VPN traffic. Confidentiality is compromised as attackers can access sensitive network configurations and potentially decrypt or monitor VPN communications. Integrity is affected since attackers can alter VPN settings, potentially introducing backdoors or weakening security controls. Availability may also be impacted if attackers disrupt VPN services or lock out legitimate administrators. Given WireGuard's widespread adoption for secure remote access, this vulnerability poses a significant threat to enterprise networks, cloud environments, and any organization using wg-portal for VPN management. The ease of exploitation and lack of required user interaction increase the likelihood of exploitation once discovered by malicious actors.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade wg-portal to version 2.1.3 or later, where the privilege escalation flaw has been fixed. For deployments using Docker images, ensure that the 'latest' tag or images built from the master branch are used, as they include the patch. Additionally, implement strict access controls to limit the number of users with authenticated access to the portal, especially non-admin users. Monitor access logs for unusual PUT requests to user profile endpoints that attempt to modify privilege-related fields. Employ network segmentation to restrict access to the wg-portal interface to trusted management networks only. Consider implementing multi-factor authentication (MFA) for all users to reduce the risk of compromised credentials being used to exploit this vulnerability. Regularly audit user privileges and database records to detect unauthorized privilege escalations. Finally, maintain an incident response plan to quickly address any suspected compromise stemming from this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-27899: CWE-269: Improper Privilege Management in h44z wg-portal
Description
WireGuard Portal (or wg-portal) is a web-based configuration portal for WireGuard server management. Prior to version 2.1.3, any authenticated non-admin user can become a full administrator by sending a single PUT request to their own user profile endpoint with `"IsAdmin": true` in the JSON body. After logging out and back in, the session picks up admin privileges from the database. When a user updates their own profile, the server parses the full JSON body into the user model, including the `IsAdmin` boolean field. A function responsible for preserving calculated or protected attributes pins certain fields to their database values (such as base model data, linked peer count, and authentication data), but it does not do this for `IsAdmin`. As a result, whatever value the client sends for `IsAdmin` is written directly to the database. After the exploit, the attacker has full admin access to the WireGuard VPN management portal. The problem was fixed in v2.1.3. The docker images for the tag 'latest' built from the master branch also include the fix.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-27899 affects wg-portal, a web-based configuration portal for WireGuard VPN server management developed by h44z. In versions prior to 2.1.3, the application improperly manages user privileges by failing to protect the 'IsAdmin' boolean field during user profile updates. When an authenticated non-admin user sends a PUT request to their own user profile endpoint with the JSON payload containing "IsAdmin": true, the server directly writes this value to the database without validation or restriction. Although some fields are pinned to their database values to prevent unauthorized changes, the 'IsAdmin' field is not protected, allowing privilege escalation. After the user logs out and back in, their session reflects the elevated admin privileges. This flaw is categorized under CWE-269 (Improper Privilege Management) and CWE-863 (Incorrect Authorization). The vulnerability allows attackers to gain full administrative access to the WireGuard portal, enabling them to alter VPN configurations, add or remove peers, and potentially disrupt or intercept VPN traffic. The vulnerability is remotely exploitable over the network without user interaction, requiring only authenticated access with non-admin credentials. The vendor fixed the issue in version 2.1.3, and the fix is included in the latest Docker images. No known exploits are reported in the wild yet, but the high CVSS score (8.8) indicates a significant risk.
Potential Impact
The impact of CVE-2026-27899 is severe for organizations relying on wg-portal for WireGuard VPN management. An attacker with any authenticated non-admin account can escalate privileges to full administrator, gaining unrestricted control over the VPN server configuration. This can lead to unauthorized creation or deletion of VPN peers, modification of routing rules, and potential interception or redirection of VPN traffic. Confidentiality is compromised as attackers can access sensitive network configurations and potentially decrypt or monitor VPN communications. Integrity is affected since attackers can alter VPN settings, potentially introducing backdoors or weakening security controls. Availability may also be impacted if attackers disrupt VPN services or lock out legitimate administrators. Given WireGuard's widespread adoption for secure remote access, this vulnerability poses a significant threat to enterprise networks, cloud environments, and any organization using wg-portal for VPN management. The ease of exploitation and lack of required user interaction increase the likelihood of exploitation once discovered by malicious actors.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade wg-portal to version 2.1.3 or later, where the privilege escalation flaw has been fixed. For deployments using Docker images, ensure that the 'latest' tag or images built from the master branch are used, as they include the patch. Additionally, implement strict access controls to limit the number of users with authenticated access to the portal, especially non-admin users. Monitor access logs for unusual PUT requests to user profile endpoints that attempt to modify privilege-related fields. Employ network segmentation to restrict access to the wg-portal interface to trusted management networks only. Consider implementing multi-factor authentication (MFA) for all users to reduce the risk of compromised credentials being used to exploit this vulnerability. Regularly audit user privileges and database records to detect unauthorized privilege escalations. Finally, maintain an incident response plan to quickly address any suspected compromise stemming from this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-24T15:19:29.717Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699fa148b7ef31ef0b7796a0
Added to database: 2/26/2026, 1:26:32 AM
Last enriched: 3/5/2026, 11:17:15 AM
Last updated: 4/12/2026, 4:21:26 AM
Views: 219
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.