Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34072: CWE-287: Improper Authentication in fccview cronmaster

0
High
VulnerabilityCVE-2026-34072cvecve-2026-34072cwe-287cwe-306cwe-693
Published: Wed Apr 01 2026 (04/01/2026, 16:51:33 UTC)
Source: CVE Database V5
Vendor/Project: fccview
Product: cronmaster

Description

Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, live logging and log history for cronjobs. Prior to version 2.2.0, an authentication bypass in middleware allows unauthenticated requests with an invalid session cookie to be treated as authenticated when the middleware’s session-validation fetch fails. This can result in unauthorized access to protected pages and unauthorized execution of privileged Next.js Server Actions. This issue has been patched in version 2.2.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 18:23:23 UTC

Technical Analysis

CronMaster (cronmaster) is a user interface tool designed to manage cronjobs with features such as human-readable syntax, live logging, and log history. Versions prior to 2.2.0 contain a critical authentication bypass vulnerability (CVE-2026-34072) classified under CWE-287 (Improper Authentication), CWE-306 (Missing Authentication for Critical Function), and CWE-693 (Protection Mechanism Failure). The root cause lies in the middleware's session validation logic: when a request includes an invalid session cookie, the middleware attempts to validate the session via a fetch operation. If this fetch fails (e.g., due to network issues or server errors), the middleware erroneously treats the request as authenticated rather than rejecting it. This flaw enables unauthenticated remote attackers to bypass authentication controls, gaining unauthorized access to protected UI pages and the ability to execute privileged Next.js Server Actions, which could lead to unauthorized cronjob execution or system manipulation. The vulnerability is exploitable remotely without requiring any user interaction or prior privileges. The issue was publicly disclosed on April 1, 2026, with a CVSS v3.1 base score of 8.3, indicating high severity. Although no active exploits have been reported, the vulnerability poses a significant risk due to the sensitive nature of cronjob management and potential for privilege escalation. The vendor has addressed the issue in version 2.2.0 by correcting the session validation logic to properly reject requests with invalid sessions regardless of fetch failures.

Potential Impact

The vulnerability allows attackers to bypass authentication and gain unauthorized access to cronjob management interfaces, potentially leading to unauthorized execution, modification, or deletion of scheduled tasks. This can disrupt automated system maintenance, backups, or other critical scheduled operations, impacting system availability and integrity. Confidentiality is also at risk as attackers may access sensitive logs or configuration data. The ability to execute privileged Next.js Server Actions further increases the risk of system compromise, lateral movement, or data exfiltration. Organizations relying on cronmaster for critical job scheduling and monitoring could face operational disruptions, data loss, or escalation of privileges. Given the remote exploitability without authentication or user interaction, the attack surface is broad, especially in environments where cronmaster is exposed to untrusted networks. The lack of known exploits in the wild currently limits immediate risk, but the high severity and ease of exploitation make timely patching essential to prevent potential attacks.

Mitigation Recommendations

Organizations should immediately upgrade cronmaster to version 2.2.0 or later, where the authentication bypass has been fixed. Until upgrading, restrict access to the cronmaster interface using network-level controls such as VPNs, IP whitelisting, or firewall rules to limit exposure to trusted users only. Implement additional authentication layers or reverse proxies with strict session validation to mitigate unauthorized access risks. Monitor cronmaster logs for unusual access patterns or unauthorized execution attempts. Conduct regular audits of scheduled jobs and server actions to detect unauthorized changes. Educate administrators about the vulnerability and the importance of timely patching. If upgrading is not immediately feasible, consider temporarily disabling remote access to the cronmaster UI or isolating it within secure network segments. Finally, maintain an incident response plan to quickly address any signs of compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-25T16:21:40.867Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cd5f16e6bfc5ba1de6e60a

Added to database: 4/1/2026, 6:08:22 PM

Last enriched: 4/1/2026, 6:23:23 PM

Last updated: 4/1/2026, 8:19:02 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses