Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe

0
Medium
VulnerabilityCVE-2026-3268cvecve-2026-3268
Published: Thu Feb 26 2026 (02/26/2026, 23:02:08 UTC)
Source: CVE Database V5
Vendor/Project: psi-probe
Product: PSI Probe

Description

A vulnerability was detected in psi-probe PSI Probe up to 5.3.0. The affected element is an unknown function of the file psi-probe-core/src/main/java/psiprobe/controllers/sessions/RemoveSessAttributeController.java of the component Session Attribute Handler. Performing a manipulation results in improper access controls. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:26:57 UTC

Technical Analysis

CVE-2026-3268 identifies an improper access control vulnerability in the PSI Probe application, specifically affecting versions 5.0 through 5.3.0. The vulnerability resides in the session attribute handler component, within an unspecified function of the RemoveSessAttributeController.java file. PSI Probe is a popular open-source monitoring tool for Apache Tomcat servers, providing insights into server status and session management. The flaw allows remote attackers with low privileges to manipulate session attributes without proper authorization checks, potentially altering or removing session data of other users. The vulnerability is exploitable remotely without user interaction or elevated privileges, increasing its risk profile. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the moderate impact on confidentiality and integrity, with no impact on availability. The vendor was notified but has not responded or issued a patch, and a public exploit exists, although no active exploitation has been reported. This vulnerability could enable attackers to interfere with session integrity, potentially leading to unauthorized access or privilege escalation within affected Tomcat environments monitored by PSI Probe. The lack of vendor response and patch availability heightens the urgency for organizations to implement compensating controls.

Potential Impact

The improper access control vulnerability in PSI Probe can lead to unauthorized manipulation of session attributes, undermining the confidentiality and integrity of user sessions. Attackers could alter or remove session data, potentially hijacking sessions, escalating privileges, or disrupting normal application behavior. This can compromise sensitive information and trust in the monitored environment. Since PSI Probe is widely used for monitoring Apache Tomcat servers, organizations relying on it for session and server management may face increased risk of internal session tampering or external attacks exploiting this flaw. The medium severity rating indicates a moderate but tangible risk, especially in environments where session integrity is critical. The absence of vendor patches and public exploit availability increases the likelihood of exploitation attempts, potentially impacting organizations globally. The vulnerability could also serve as a stepping stone for more complex attacks targeting Tomcat infrastructure.

Mitigation Recommendations

Given the absence of official patches, organizations should implement immediate compensating controls to mitigate risk. First, restrict network access to PSI Probe interfaces by limiting exposure to trusted internal networks or VPNs only. Employ strong authentication and authorization mechanisms around PSI Probe access points to prevent unauthorized users from reaching vulnerable endpoints. Monitor session activity and logs for unusual or unauthorized session attribute changes to detect potential exploitation attempts. Consider disabling or limiting the use of session attribute manipulation features within PSI Probe if feasible. Regularly update and audit Tomcat and PSI Probe configurations to minimize attack surface. Stay alert for vendor updates or community patches addressing this vulnerability and apply them promptly once available. Additionally, conduct security awareness training for administrators managing PSI Probe to recognize and respond to suspicious activity. Finally, consider deploying web application firewalls (WAFs) with custom rules to block suspicious requests targeting session attribute handlers.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-26T15:13:33.692Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a0d31032ffcdb8a2667e09

Added to database: 2/26/2026, 11:11:12 PM

Last enriched: 2/26/2026, 11:26:57 PM

Last updated: 4/12/2026, 9:55:17 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses