CVE-2026-29194: CWE-863: Incorrect Authorization in gravitl netmaker
Netmaker makes networks with WireGuard. Prior to version 1.5.0, the Authorize middleware in Netmaker incorrectly validates host JWT tokens. When a route permits host authentication (hostAllowed=true), a valid host token bypasses all subsequent authorization checks without verifying that the host is authorized to access the specific requested resource. Any entity possessing knowledge of object identifiers (node IDs, host IDs) can craft a request with an arbitrary valid host token to access, modify, or delete resources belonging to other hosts. Affected endpoints include node info retrieval, host deletion, MQTT signal transmission, fallback host updates, and failover operations. This issue has been patched in version 1.5.0.
AI Analysis
Technical Summary
CVE-2026-29194 is an authorization bypass vulnerability classified under CWE-863 in the gravitl Netmaker software, which facilitates the creation of networks using WireGuard. Prior to version 1.5.0, the Authorize middleware component incorrectly validates host JWT tokens. Specifically, when a route permits host authentication (hostAllowed=true), the middleware accepts any valid host token and bypasses all subsequent authorization checks without verifying whether the host is authorized to access the requested resource. This means that an attacker who possesses a valid host token and knows object identifiers such as node IDs or host IDs can craft requests to access, modify, or delete resources that belong to other hosts. The vulnerability affects multiple critical endpoints, including node info retrieval, host deletion, MQTT signal transmission, fallback host updates, and failover operations. The flaw undermines the principle of least privilege by allowing unauthorized access based solely on possession of a valid token, without further resource-level authorization. The vulnerability has a CVSS 4.0 base score of 8.6 (high severity), reflecting its network attack vector, low complexity, no required user interaction, and significant impact on confidentiality and integrity. The issue was publicly disclosed on March 7, 2026, and patched in Netmaker version 1.5.0. No known exploits have been reported in the wild to date.
Potential Impact
The vulnerability allows attackers to bypass fine-grained authorization controls in Netmaker, leading to unauthorized access and manipulation of network resources. This can result in exposure of sensitive network topology information, unauthorized deletion or modification of nodes and hosts, disruption of network signaling via MQTT, and interference with fallback and failover mechanisms. Such unauthorized actions could degrade network reliability, compromise data confidentiality, and potentially facilitate lateral movement or further attacks within affected networks. Organizations relying on Netmaker for WireGuard network management may face operational disruptions, data breaches, and increased risk of persistent compromise if this vulnerability is exploited. The ease of exploitation—requiring only possession of a valid host token and knowledge of object identifiers—heightens the threat, especially in environments where token leakage or insider threats are possible.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade all Netmaker deployments to version 1.5.0 or later, where the authorization checks have been corrected. Additionally, review and rotate host JWT tokens to limit the risk from potentially compromised tokens. Implement strict token issuance and storage policies to prevent token leakage. Employ network segmentation and monitoring to detect anomalous access patterns to Netmaker endpoints. Audit access logs for unusual activity related to node and host resource requests. Where possible, enforce additional access controls at the network or application layer to restrict access to Netmaker management interfaces. Finally, educate administrators and users about the importance of safeguarding authentication tokens and promptly applying security patches.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-29194: CWE-863: Incorrect Authorization in gravitl netmaker
Description
Netmaker makes networks with WireGuard. Prior to version 1.5.0, the Authorize middleware in Netmaker incorrectly validates host JWT tokens. When a route permits host authentication (hostAllowed=true), a valid host token bypasses all subsequent authorization checks without verifying that the host is authorized to access the specific requested resource. Any entity possessing knowledge of object identifiers (node IDs, host IDs) can craft a request with an arbitrary valid host token to access, modify, or delete resources belonging to other hosts. Affected endpoints include node info retrieval, host deletion, MQTT signal transmission, fallback host updates, and failover operations. This issue has been patched in version 1.5.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-29194 is an authorization bypass vulnerability classified under CWE-863 in the gravitl Netmaker software, which facilitates the creation of networks using WireGuard. Prior to version 1.5.0, the Authorize middleware component incorrectly validates host JWT tokens. Specifically, when a route permits host authentication (hostAllowed=true), the middleware accepts any valid host token and bypasses all subsequent authorization checks without verifying whether the host is authorized to access the requested resource. This means that an attacker who possesses a valid host token and knows object identifiers such as node IDs or host IDs can craft requests to access, modify, or delete resources that belong to other hosts. The vulnerability affects multiple critical endpoints, including node info retrieval, host deletion, MQTT signal transmission, fallback host updates, and failover operations. The flaw undermines the principle of least privilege by allowing unauthorized access based solely on possession of a valid token, without further resource-level authorization. The vulnerability has a CVSS 4.0 base score of 8.6 (high severity), reflecting its network attack vector, low complexity, no required user interaction, and significant impact on confidentiality and integrity. The issue was publicly disclosed on March 7, 2026, and patched in Netmaker version 1.5.0. No known exploits have been reported in the wild to date.
Potential Impact
The vulnerability allows attackers to bypass fine-grained authorization controls in Netmaker, leading to unauthorized access and manipulation of network resources. This can result in exposure of sensitive network topology information, unauthorized deletion or modification of nodes and hosts, disruption of network signaling via MQTT, and interference with fallback and failover mechanisms. Such unauthorized actions could degrade network reliability, compromise data confidentiality, and potentially facilitate lateral movement or further attacks within affected networks. Organizations relying on Netmaker for WireGuard network management may face operational disruptions, data breaches, and increased risk of persistent compromise if this vulnerability is exploited. The ease of exploitation—requiring only possession of a valid host token and knowledge of object identifiers—heightens the threat, especially in environments where token leakage or insider threats are possible.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade all Netmaker deployments to version 1.5.0 or later, where the authorization checks have been corrected. Additionally, review and rotate host JWT tokens to limit the risk from potentially compromised tokens. Implement strict token issuance and storage policies to prevent token leakage. Employ network segmentation and monitoring to detect anomalous access patterns to Netmaker endpoints. Audit access logs for unusual activity related to node and host resource requests. Where possible, enforce additional access controls at the network or application layer to restrict access to Netmaker management interfaces. Finally, educate administrators and users about the importance of safeguarding authentication tokens and promptly applying security patches.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-04T14:44:00.715Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69ac4f4bc48b3f10ffae7abf
Added to database: 3/7/2026, 4:16:11 PM
Last enriched: 3/14/2026, 7:55:32 PM
Last updated: 4/21/2026, 4:49:28 AM
Views: 100
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.