Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2896: Improper Authorization in funadmin

0
Medium
VulnerabilityCVE-2026-2896cvecve-2026-2896
Published: Sat Feb 21 2026 (02/21/2026, 23:32:08 UTC)
Source: CVE Database V5
Product: funadmin

Description

CVE-2026-2896 is a medium-severity vulnerability in funadmin versions up to 7. 1. 0-rc4, specifically in the setConfig function of app/backend/controller/Ajax. php. It allows remote attackers to perform improper authorization, potentially manipulating configuration settings without authentication or user interaction. The vulnerability is exploitable over the network with low attack complexity and no privileges required. Although no known exploits are currently active in the wild, the exploit code has been publicly disclosed. The vendor has not responded to disclosure attempts, and no official patch is available. Organizations using affected funadmin versions are at risk of unauthorized configuration changes that could compromise system integrity and confidentiality. Mitigation requires careful access control, network restrictions, and monitoring until a vendor patch is released.

AI-Powered Analysis

AILast updated: 02/22/2026, 00:01:29 UTC

Technical Analysis

CVE-2026-2896 identifies an improper authorization vulnerability in funadmin, a web-based administration framework, affecting versions 7.1.0-rc1 through 7.1.0-rc4. The flaw resides in the setConfig function within the Configuration Handler component (app/backend/controller/Ajax.php), which improperly validates authorization before allowing configuration changes. This weakness enables remote attackers to manipulate configuration settings without any authentication or user interaction, due to missing or flawed access control checks. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and partial impact on confidentiality, integrity, and availability (VC:L/VI:L/VA:L). The exploit code has been publicly disclosed, increasing the risk of exploitation despite no known active attacks. The vendor has not responded to early disclosure attempts, and no official patches or mitigations have been published. This leaves organizations relying on affected funadmin versions vulnerable to unauthorized configuration manipulation, which could lead to further compromise or service disruption.

Potential Impact

The improper authorization vulnerability allows remote attackers to alter configuration settings without authentication, potentially undermining system integrity and confidentiality. Unauthorized configuration changes can lead to privilege escalation, exposure of sensitive data, or disruption of services. Since the vulnerability requires no user interaction and can be exploited remotely, it poses a significant risk to exposed funadmin installations. Organizations using affected versions may face increased risk of targeted attacks, especially if funadmin is deployed in critical infrastructure or administrative environments. The lack of vendor response and patches prolongs exposure, increasing the window for attackers to exploit the vulnerability. This can result in operational disruptions, data breaches, and loss of trust in affected systems.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict network-level access controls to restrict access to funadmin interfaces, limiting them to trusted IP addresses or VPNs. Deploy web application firewalls (WAFs) with custom rules to detect and block attempts to invoke the vulnerable setConfig function remotely. Conduct thorough audits of current funadmin configurations to identify and remediate any unauthorized changes. Monitor logs for suspicious activity related to configuration changes or access to the Ajax.php endpoint. Consider isolating funadmin instances from the internet or untrusted networks. If possible, upgrade to a non-affected version or apply community-developed patches or workarounds after thorough testing. Maintain regular backups of configuration data to enable recovery from unauthorized modifications. Engage with the vendor or community for updates and share threat intelligence to stay informed about emerging exploits or patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T18:56:46.376Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699a4401be58cf853b61d862

Added to database: 2/21/2026, 11:47:13 PM

Last enriched: 2/22/2026, 12:01:29 AM

Last updated: 2/22/2026, 6:22:40 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats