CVE-2026-34233: CWE-284: Improper Access Control in Ctrlpanel-gg panel
CtrlPanel versions 1. 1. 1 and earlier contain an improper access control vulnerability in multiple admin controllers. These controllers expose DataTable endpoints via GET requests without enforcing admin-level authorization, allowing any authenticated user to access sensitive administrative data. Exploitation can lead to unauthorized disclosure of user PII, payment and transaction records, voucher codes, role and permission details, server ownership mappings, and support ticket contents. The issue is fixed in version 1. 2. 0.
AI Analysis
Technical Summary
CVE-2026-34233 is an improper access control vulnerability (CWE-284) in CtrlPanel (open-source billing software) versions prior to 1.2.0. Multiple admin controllers expose datatable() methods accessible via GET requests under the /admin/ route prefix but lack permission or role verification. Although the routes are under /admin/, the middleware does not enforce admin-level authorization on these endpoints. Consequently, any authenticated user, regardless of role, can query these endpoints and retrieve paginated JSON responses containing sensitive administrative data including user PII, payment records, voucher codes, role structures, server ownership, and support tickets. This vulnerability allows unauthorized data enumeration but does not affect data integrity or availability. The vulnerability has been addressed in CtrlPanel version 1.2.0.
Potential Impact
The vulnerability allows any authenticated user to access sensitive administrative data that should be restricted to administrators. This includes personally identifiable information, financial transaction data, voucher and coupon codes, role and permission configurations, server ownership details, and support ticket information. The impact is limited to confidentiality loss; there is no indication of integrity or availability compromise. No known exploits in the wild have been reported.
Mitigation Recommendations
Upgrade CtrlPanel to version 1.2.0 or later, where this improper access control issue has been fixed. Until the upgrade is applied, restrict authenticated user access to the affected admin DataTable endpoints or implement additional access control checks to enforce admin-level permissions on these routes. Patch status is not explicitly stated beyond the fix in version 1.2.0; verify with the vendor advisory for the latest remediation guidance.
CVE-2026-34233: CWE-284: Improper Access Control in Ctrlpanel-gg panel
Description
CtrlPanel versions 1. 1. 1 and earlier contain an improper access control vulnerability in multiple admin controllers. These controllers expose DataTable endpoints via GET requests without enforcing admin-level authorization, allowing any authenticated user to access sensitive administrative data. Exploitation can lead to unauthorized disclosure of user PII, payment and transaction records, voucher codes, role and permission details, server ownership mappings, and support ticket contents. The issue is fixed in version 1. 2. 0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34233 is an improper access control vulnerability (CWE-284) in CtrlPanel (open-source billing software) versions prior to 1.2.0. Multiple admin controllers expose datatable() methods accessible via GET requests under the /admin/ route prefix but lack permission or role verification. Although the routes are under /admin/, the middleware does not enforce admin-level authorization on these endpoints. Consequently, any authenticated user, regardless of role, can query these endpoints and retrieve paginated JSON responses containing sensitive administrative data including user PII, payment records, voucher codes, role structures, server ownership, and support tickets. This vulnerability allows unauthorized data enumeration but does not affect data integrity or availability. The vulnerability has been addressed in CtrlPanel version 1.2.0.
Potential Impact
The vulnerability allows any authenticated user to access sensitive administrative data that should be restricted to administrators. This includes personally identifiable information, financial transaction data, voucher and coupon codes, role and permission configurations, server ownership details, and support ticket information. The impact is limited to confidentiality loss; there is no indication of integrity or availability compromise. No known exploits in the wild have been reported.
Mitigation Recommendations
Upgrade CtrlPanel to version 1.2.0 or later, where this improper access control issue has been fixed. Until the upgrade is applied, restrict authenticated user access to the affected admin DataTable endpoints or implement additional access control checks to enforce admin-level permissions on these routes. Patch status is not explicitly stated beyond the fix in version 1.2.0; verify with the vendor advisory for the latest remediation guidance.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-26T16:22:29.034Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a0cd03bba1db47362edbc4f
Added to database: 5/19/2026, 9:03:55 PM
Last enriched: 5/19/2026, 9:18:28 PM
Last updated: 5/19/2026, 10:07:40 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.