Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32736: CWE-862: Missing Authorization in HytaleModding wiki

0
Medium
VulnerabilityCVE-2026-32736cvecve-2026-32736cwe-862
Published: Wed Mar 18 2026 (03/18/2026, 22:06:10 UTC)
Source: CVE Database V5
Vendor/Project: HytaleModding
Product: wiki

Description

CVE-2026-32736 is an Insecure Direct Object Reference (IDOR) vulnerability affecting versions of the Hytale Modding Wiki prior to 1. 0. 0. This vulnerability allows any authenticated user to access personal information of mod authors, including full names and email addresses, by simply visiting a mod page. Exploitation requires only account creation and no additional user interaction. The flaw stems from missing authorization checks when accessing mod author data. The vulnerability has a CVSS score of 4. 3, indicating medium severity, with confidentiality impacted but no effect on integrity or availability. Version 1. 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 01:09:48 UTC

Technical Analysis

CVE-2026-32736 is a security vulnerability classified as CWE-862 (Missing Authorization) found in the Hytale Modding Wiki software versions prior to 1.0.0. The vulnerability manifests as an Insecure Direct Object Reference (IDOR), where the application fails to enforce proper authorization checks on requests for mod author information. Specifically, any authenticated user who creates an account on the wiki can access sensitive personal data of mod authors, such as full names and email addresses, by navigating to mod pages identified by their slugs. This exposure occurs because the system does not verify whether the requesting user has permission to view the author details. The vulnerability affects confidentiality but does not impact data integrity or system availability. The CVSS 3.1 base score is 4.3, reflecting a medium severity level due to the ease of exploitation (low attack complexity, no user interaction beyond authentication) and limited impact scope. The vulnerability was publicly disclosed on March 18, 2026, and fixed in version 1.0.0 of the Hytale Modding Wiki. No known exploits have been reported in the wild. The flaw primarily threatens the privacy of mod authors by exposing their personal information to unauthorized users within the platform.

Potential Impact

The primary impact of CVE-2026-32736 is the unauthorized disclosure of personally identifiable information (PII) of mod authors, including full names and email addresses. This exposure can lead to privacy violations, targeted phishing attacks, social engineering, and potential harassment of affected individuals. While the vulnerability does not affect system integrity or availability, the breach of confidentiality can damage user trust in the Hytale Modding Wiki platform and potentially harm the reputation of mod authors. Organizations or communities relying on this wiki for mod documentation may face compliance issues with data protection regulations such as GDPR if personal data is exposed without consent. Although exploitation requires authentication, the low barrier to create accounts means a wide range of attackers could access sensitive data. The lack of known exploits in the wild reduces immediate risk, but the vulnerability remains a concern until patched.

Mitigation Recommendations

To mitigate CVE-2026-32736, organizations should upgrade the Hytale Modding Wiki to version 1.0.0 or later, where proper authorization checks have been implemented to restrict access to mod author personal information. Until upgrading is possible, administrators should consider restricting account creation to trusted users only or implementing additional access controls at the web server or application firewall level to limit access to mod author data pages. Monitoring user activity for unusual access patterns to mod pages can help detect potential exploitation attempts. Additionally, mod authors should be informed about the risk and advised to avoid sharing sensitive personal information on the platform. Regular security audits and code reviews focusing on authorization logic can prevent similar IDOR vulnerabilities. Finally, organizations should ensure compliance with relevant data protection laws by reviewing data handling and privacy policies related to the wiki.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T15:02:00.627Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bb2706771bdb1749cae226

Added to database: 3/18/2026, 10:28:22 PM

Last enriched: 3/26/2026, 1:09:48 AM

Last updated: 5/2/2026, 12:09:24 PM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses