Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32300: CWE-285: Improper Authorization in opensource-workshop connect-cms

0
High
VulnerabilityCVE-2026-32300cvecve-2026-32300cwe-285cwe-639
Published: Mon Mar 23 2026 (03/23/2026, 21:40:59 UTC)
Source: CVE Database V5
Vendor/Project: opensource-workshop
Product: connect-cms

Description

Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, an improper authorization issue in the My Page profile update feature may allow modification of arbitrary user information. Versions 1.41.1 and 2.41.1 contain a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:12:16 UTC

Technical Analysis

CVE-2026-32300 is an improper authorization vulnerability (CWE-285) identified in Connect-CMS, a widely used open-source content management system. The vulnerability specifically resides in the My Page profile update functionality, where insufficient authorization controls allow authenticated users with limited privileges to modify arbitrary user information. This flaw enables attackers to alter other users' profile data without proper permission validation, violating access control policies. The vulnerability affects Connect-CMS versions prior to 1.41.1 in the 1.x series and versions from 2.0.0 up to 2.41.0 in the 2.x series. The CVSS v3.1 base score is 8.1, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H/A:N). The vulnerability does not impact availability. No public exploits have been reported yet, but the presence of a patch in versions 1.41.1 and 2.41.1 indicates the vendor's acknowledgment and remediation. The issue also relates to CWE-639, which concerns authorization errors leading to improper access control. This vulnerability could be exploited remotely by authenticated users to escalate privileges or manipulate user data, potentially undermining trust and security of the CMS environment.

Potential Impact

The impact of CVE-2026-32300 is significant for organizations using affected Connect-CMS versions. Unauthorized modification of user profile information can lead to privilege escalation, data integrity violations, and potential impersonation of users. Attackers could alter critical user attributes, such as roles or contact information, enabling further attacks or unauthorized access to sensitive resources. This compromises confidentiality and integrity of user data and may facilitate lateral movement within the affected environment. For organizations relying on Connect-CMS for public-facing or internal content management, this vulnerability could undermine user trust and lead to regulatory compliance issues if personal data is manipulated or exposed. Although availability is not affected, the breach of access controls poses a serious security risk, especially in environments with multiple user roles and sensitive information. The lack of known exploits in the wild suggests limited current exploitation but does not preclude future attacks, emphasizing the need for prompt remediation.

Mitigation Recommendations

To mitigate CVE-2026-32300, organizations should immediately upgrade Connect-CMS to version 1.41.1 or 2.41.1 or later, where the vulnerability has been patched. In addition to patching, administrators should audit user permissions and roles to ensure the principle of least privilege is enforced, minimizing the risk of unauthorized access. Implementing robust monitoring and logging of profile update activities can help detect suspicious modifications. Employing web application firewalls (WAFs) with custom rules to detect anomalous requests targeting profile update endpoints may provide temporary protection. Regular security assessments and code reviews of custom plugins or integrations with Connect-CMS are recommended to prevent similar authorization flaws. Organizations should also educate users about the importance of strong authentication and consider multi-factor authentication (MFA) to reduce risk from compromised credentials. Finally, maintaining an incident response plan tailored to CMS compromise scenarios will improve readiness in case of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T21:16:21.658Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c1b815f4197a8e3b93226e

Added to database: 3/23/2026, 10:00:53 PM

Last enriched: 3/31/2026, 8:12:16 PM

Last updated: 5/7/2026, 5:39:52 PM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses