CVE-2026-34072: CWE-287: Improper Authentication in fccview cronmaster
Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, live logging and log history for cronjobs. Prior to version 2.2.0, an authentication bypass in middleware allows unauthenticated requests with an invalid session cookie to be treated as authenticated when the middleware’s session-validation fetch fails. This can result in unauthorized access to protected pages and unauthorized execution of privileged Next.js Server Actions. This issue has been patched in version 2.2.0.
AI Analysis
Technical Summary
CronMaster (cronmaster) is a user interface tool designed to manage cronjobs with features such as human-readable syntax, live logging, and log history. Versions prior to 2.2.0 contain a critical authentication bypass vulnerability (CVE-2026-34072) classified under CWE-287 (Improper Authentication), CWE-306 (Missing Authentication for Critical Function), and CWE-693 (Protection Mechanism Failure). The root cause lies in the middleware's session validation logic: when a request includes an invalid session cookie, the middleware attempts to validate the session via a fetch operation. If this fetch fails (e.g., due to network issues or server errors), the middleware erroneously treats the request as authenticated rather than rejecting it. This flaw enables unauthenticated remote attackers to bypass authentication controls, gaining unauthorized access to protected UI pages and the ability to execute privileged Next.js Server Actions, which could lead to unauthorized cronjob execution or system manipulation. The vulnerability is exploitable remotely without requiring any user interaction or prior privileges. The issue was publicly disclosed on April 1, 2026, with a CVSS v3.1 base score of 8.3, indicating high severity. Although no active exploits have been reported, the vulnerability poses a significant risk due to the sensitive nature of cronjob management and potential for privilege escalation. The vendor has addressed the issue in version 2.2.0 by correcting the session validation logic to properly reject requests with invalid sessions regardless of fetch failures.
Potential Impact
The vulnerability allows attackers to bypass authentication and gain unauthorized access to cronjob management interfaces, potentially leading to unauthorized execution, modification, or deletion of scheduled tasks. This can disrupt automated system maintenance, backups, or other critical scheduled operations, impacting system availability and integrity. Confidentiality is also at risk as attackers may access sensitive logs or configuration data. The ability to execute privileged Next.js Server Actions further increases the risk of system compromise, lateral movement, or data exfiltration. Organizations relying on cronmaster for critical job scheduling and monitoring could face operational disruptions, data loss, or escalation of privileges. Given the remote exploitability without authentication or user interaction, the attack surface is broad, especially in environments where cronmaster is exposed to untrusted networks. The lack of known exploits in the wild currently limits immediate risk, but the high severity and ease of exploitation make timely patching essential to prevent potential attacks.
Mitigation Recommendations
Organizations should immediately upgrade cronmaster to version 2.2.0 or later, where the authentication bypass has been fixed. Until upgrading, restrict access to the cronmaster interface using network-level controls such as VPNs, IP whitelisting, or firewall rules to limit exposure to trusted users only. Implement additional authentication layers or reverse proxies with strict session validation to mitigate unauthorized access risks. Monitor cronmaster logs for unusual access patterns or unauthorized execution attempts. Conduct regular audits of scheduled jobs and server actions to detect unauthorized changes. Educate administrators about the vulnerability and the importance of timely patching. If upgrading is not immediately feasible, consider temporarily disabling remote access to the cronmaster UI or isolating it within secure network segments. Finally, maintain an incident response plan to quickly address any signs of compromise related to this vulnerability.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, India, Canada, Australia, Netherlands
CVE-2026-34072: CWE-287: Improper Authentication in fccview cronmaster
Description
Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, live logging and log history for cronjobs. Prior to version 2.2.0, an authentication bypass in middleware allows unauthenticated requests with an invalid session cookie to be treated as authenticated when the middleware’s session-validation fetch fails. This can result in unauthorized access to protected pages and unauthorized execution of privileged Next.js Server Actions. This issue has been patched in version 2.2.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CronMaster (cronmaster) is a user interface tool designed to manage cronjobs with features such as human-readable syntax, live logging, and log history. Versions prior to 2.2.0 contain a critical authentication bypass vulnerability (CVE-2026-34072) classified under CWE-287 (Improper Authentication), CWE-306 (Missing Authentication for Critical Function), and CWE-693 (Protection Mechanism Failure). The root cause lies in the middleware's session validation logic: when a request includes an invalid session cookie, the middleware attempts to validate the session via a fetch operation. If this fetch fails (e.g., due to network issues or server errors), the middleware erroneously treats the request as authenticated rather than rejecting it. This flaw enables unauthenticated remote attackers to bypass authentication controls, gaining unauthorized access to protected UI pages and the ability to execute privileged Next.js Server Actions, which could lead to unauthorized cronjob execution or system manipulation. The vulnerability is exploitable remotely without requiring any user interaction or prior privileges. The issue was publicly disclosed on April 1, 2026, with a CVSS v3.1 base score of 8.3, indicating high severity. Although no active exploits have been reported, the vulnerability poses a significant risk due to the sensitive nature of cronjob management and potential for privilege escalation. The vendor has addressed the issue in version 2.2.0 by correcting the session validation logic to properly reject requests with invalid sessions regardless of fetch failures.
Potential Impact
The vulnerability allows attackers to bypass authentication and gain unauthorized access to cronjob management interfaces, potentially leading to unauthorized execution, modification, or deletion of scheduled tasks. This can disrupt automated system maintenance, backups, or other critical scheduled operations, impacting system availability and integrity. Confidentiality is also at risk as attackers may access sensitive logs or configuration data. The ability to execute privileged Next.js Server Actions further increases the risk of system compromise, lateral movement, or data exfiltration. Organizations relying on cronmaster for critical job scheduling and monitoring could face operational disruptions, data loss, or escalation of privileges. Given the remote exploitability without authentication or user interaction, the attack surface is broad, especially in environments where cronmaster is exposed to untrusted networks. The lack of known exploits in the wild currently limits immediate risk, but the high severity and ease of exploitation make timely patching essential to prevent potential attacks.
Mitigation Recommendations
Organizations should immediately upgrade cronmaster to version 2.2.0 or later, where the authentication bypass has been fixed. Until upgrading, restrict access to the cronmaster interface using network-level controls such as VPNs, IP whitelisting, or firewall rules to limit exposure to trusted users only. Implement additional authentication layers or reverse proxies with strict session validation to mitigate unauthorized access risks. Monitor cronmaster logs for unusual access patterns or unauthorized execution attempts. Conduct regular audits of scheduled jobs and server actions to detect unauthorized changes. Educate administrators about the vulnerability and the importance of timely patching. If upgrading is not immediately feasible, consider temporarily disabling remote access to the cronmaster UI or isolating it within secure network segments. Finally, maintain an incident response plan to quickly address any signs of compromise related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-25T16:21:40.867Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cd5f16e6bfc5ba1de6e60a
Added to database: 4/1/2026, 6:08:22 PM
Last enriched: 4/1/2026, 6:23:23 PM
Last updated: 4/1/2026, 8:19:02 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.