CVE-2026-29196: CWE-863: Incorrect Authorization in gravitl netmaker
Netmaker makes networks with WireGuard. Prior to version 1.5.0, a user assigned the platform-user role can retrieve WireGuard private keys of all wireguard configs in a network by calling GET /api/extclients/{network} or GET /api/nodes/{network}. While the Netmaker UI restricts visibility, the API endpoints return full records, including private keys, without filtering based on the requesting user's ownership. This issue has been patched in version 1.5.0.
AI Analysis
Technical Summary
Netmaker is a platform that facilitates the creation and management of WireGuard-based networks. Prior to version 1.5.0, a critical authorization flaw (CVE-2026-29196) existed in the API endpoints GET /api/extclients/{network} and GET /api/nodes/{network}. These endpoints return full WireGuard configuration records, including private keys, without verifying whether the requesting user owns or is authorized to access those keys. Although the Netmaker UI restricts key visibility based on user ownership, the API lacks such filtering, allowing any user assigned the platform-user role to retrieve private keys for all nodes within a network. This vulnerability is classified under CWE-863 (Incorrect Authorization) and has a CVSS 4.0 score of 8.7, indicating high severity. Exploiting this flaw requires no authentication or user interaction, and the attack vector is network-based. The exposure of private keys undermines the confidentiality and integrity of WireGuard VPN communications, enabling attackers to impersonate legitimate nodes, intercept, or decrypt network traffic. The issue was addressed and patched in Netmaker version 1.5.0 by implementing proper authorization checks on these API endpoints.
Potential Impact
The unauthorized disclosure of WireGuard private keys poses a severe risk to organizations relying on Netmaker for secure network management. Attackers gaining access to private keys can impersonate legitimate VPN nodes, intercept or decrypt sensitive communications, and potentially pivot within internal networks. This compromises confidentiality and integrity of data in transit, undermining trust in the VPN infrastructure. Organizations using affected Netmaker versions may face data breaches, loss of intellectual property, regulatory non-compliance, and operational disruptions. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of widespread abuse. Additionally, compromised VPN nodes could serve as footholds for further attacks, escalating the overall security risk.
Mitigation Recommendations
Organizations should immediately upgrade Netmaker to version 1.5.0 or later, where the authorization flaw is patched. Until upgrading is possible, restrict platform-user role assignments to trusted personnel only and monitor API access logs for suspicious activity. Implement network segmentation and firewall rules to limit access to Netmaker API endpoints. Conduct thorough audits of existing API permissions and remove unnecessary privileges. Employ multi-factor authentication and strong access controls on management interfaces. Additionally, rotate WireGuard private keys and regenerate configurations after patching to invalidate any potentially compromised keys. Regularly review and update security policies to ensure least privilege principles are enforced for all platform users.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-29196: CWE-863: Incorrect Authorization in gravitl netmaker
Description
Netmaker makes networks with WireGuard. Prior to version 1.5.0, a user assigned the platform-user role can retrieve WireGuard private keys of all wireguard configs in a network by calling GET /api/extclients/{network} or GET /api/nodes/{network}. While the Netmaker UI restricts visibility, the API endpoints return full records, including private keys, without filtering based on the requesting user's ownership. This issue has been patched in version 1.5.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Netmaker is a platform that facilitates the creation and management of WireGuard-based networks. Prior to version 1.5.0, a critical authorization flaw (CVE-2026-29196) existed in the API endpoints GET /api/extclients/{network} and GET /api/nodes/{network}. These endpoints return full WireGuard configuration records, including private keys, without verifying whether the requesting user owns or is authorized to access those keys. Although the Netmaker UI restricts key visibility based on user ownership, the API lacks such filtering, allowing any user assigned the platform-user role to retrieve private keys for all nodes within a network. This vulnerability is classified under CWE-863 (Incorrect Authorization) and has a CVSS 4.0 score of 8.7, indicating high severity. Exploiting this flaw requires no authentication or user interaction, and the attack vector is network-based. The exposure of private keys undermines the confidentiality and integrity of WireGuard VPN communications, enabling attackers to impersonate legitimate nodes, intercept, or decrypt network traffic. The issue was addressed and patched in Netmaker version 1.5.0 by implementing proper authorization checks on these API endpoints.
Potential Impact
The unauthorized disclosure of WireGuard private keys poses a severe risk to organizations relying on Netmaker for secure network management. Attackers gaining access to private keys can impersonate legitimate VPN nodes, intercept or decrypt sensitive communications, and potentially pivot within internal networks. This compromises confidentiality and integrity of data in transit, undermining trust in the VPN infrastructure. Organizations using affected Netmaker versions may face data breaches, loss of intellectual property, regulatory non-compliance, and operational disruptions. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of widespread abuse. Additionally, compromised VPN nodes could serve as footholds for further attacks, escalating the overall security risk.
Mitigation Recommendations
Organizations should immediately upgrade Netmaker to version 1.5.0 or later, where the authorization flaw is patched. Until upgrading is possible, restrict platform-user role assignments to trusted personnel only and monitor API access logs for suspicious activity. Implement network segmentation and firewall rules to limit access to Netmaker API endpoints. Conduct thorough audits of existing API permissions and remove unnecessary privileges. Employ multi-factor authentication and strong access controls on management interfaces. Additionally, rotate WireGuard private keys and regenerate configurations after patching to invalidate any potentially compromised keys. Regularly review and update security policies to ensure least privilege principles are enforced for all platform users.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-04T14:44:00.715Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69ac52cfc48b3f10ffafee8c
Added to database: 3/7/2026, 4:31:11 PM
Last enriched: 3/14/2026, 7:55:56 PM
Last updated: 4/20/2026, 7:03:37 PM
Views: 132
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.