Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34233: CWE-284: Improper Access Control in Ctrlpanel-gg panel

0
Medium
VulnerabilityCVE-2026-34233cvecve-2026-34233cwe-284cwe-862
Published: Tue May 19 2026 (05/19/2026, 20:38:41 UTC)
Source: CVE Database V5
Vendor/Project: Ctrlpanel-gg
Product: panel

Description

CtrlPanel versions 1. 1. 1 and earlier contain an improper access control vulnerability in multiple admin controllers. These controllers expose DataTable endpoints via GET requests without enforcing admin-level authorization, allowing any authenticated user to access sensitive administrative data. Exploitation can lead to unauthorized disclosure of user PII, payment and transaction records, voucher codes, role and permission details, server ownership mappings, and support ticket contents. The issue is fixed in version 1. 2. 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/19/2026, 21:18:28 UTC

Technical Analysis

CVE-2026-34233 is an improper access control vulnerability (CWE-284) in CtrlPanel (open-source billing software) versions prior to 1.2.0. Multiple admin controllers expose datatable() methods accessible via GET requests under the /admin/ route prefix but lack permission or role verification. Although the routes are under /admin/, the middleware does not enforce admin-level authorization on these endpoints. Consequently, any authenticated user, regardless of role, can query these endpoints and retrieve paginated JSON responses containing sensitive administrative data including user PII, payment records, voucher codes, role structures, server ownership, and support tickets. This vulnerability allows unauthorized data enumeration but does not affect data integrity or availability. The vulnerability has been addressed in CtrlPanel version 1.2.0.

Potential Impact

The vulnerability allows any authenticated user to access sensitive administrative data that should be restricted to administrators. This includes personally identifiable information, financial transaction data, voucher and coupon codes, role and permission configurations, server ownership details, and support ticket information. The impact is limited to confidentiality loss; there is no indication of integrity or availability compromise. No known exploits in the wild have been reported.

Mitigation Recommendations

Upgrade CtrlPanel to version 1.2.0 or later, where this improper access control issue has been fixed. Until the upgrade is applied, restrict authenticated user access to the affected admin DataTable endpoints or implement additional access control checks to enforce admin-level permissions on these routes. Patch status is not explicitly stated beyond the fix in version 1.2.0; verify with the vendor advisory for the latest remediation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-26T16:22:29.034Z
Cvss Version
3.1
State
PUBLISHED
Remediation Level
null

Threat ID: 6a0cd03bba1db47362edbc4f

Added to database: 5/19/2026, 9:03:55 PM

Last enriched: 5/19/2026, 9:18:28 PM

Last updated: 5/19/2026, 10:07:40 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses