CVE-2026-34584: CWE-639: Authorization Bypass Through User-Controlled Key in knadh listmonk
listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, bugs in list permission checks allows users in a multi-user environment to access to lists (which they don't have access to) under different scenarios. This only affects multi-user environments with untrusted users. This issue has been patched in version 6.1.0.
AI Analysis
Technical Summary
CVE-2026-34584 is an authorization bypass vulnerability identified in the listmonk newsletter and mailing list manager software, specifically affecting versions from 4.1.0 up to but not including 6.1.0. Listmonk is a self-hosted platform used to manage mailing lists and newsletters, often deployed in multi-user environments. The vulnerability arises due to bugs in the permission checking logic that improperly validate user access rights to mailing lists. This flaw allows authenticated users with limited privileges to access mailing lists they are not authorized to view or manage by manipulating user-controlled keys used in authorization decisions. The underlying weakness corresponds to CWE-639, which involves authorization bypass through user-controlled keys. Exploitation requires network access and authenticated user privileges but does not require user interaction, making it relatively straightforward for insiders or compromised accounts to leverage. The vulnerability impacts confidentiality and integrity by exposing mailing list data and potentially allowing unauthorized modifications. The issue has been addressed and patched in listmonk version 6.1.0. No public exploits have been reported so far, but the medium CVSS score of 5.4 reflects the moderate risk posed by this flaw in environments with untrusted users. Organizations running affected versions should prioritize upgrading to the patched release to prevent unauthorized data access and maintain secure multi-user operations.
Potential Impact
This vulnerability can lead to unauthorized access to mailing lists within listmonk deployments, compromising the confidentiality of subscriber data and potentially the integrity of mailing list content. Organizations relying on listmonk for managing newsletters and communications may face data leakage risks, especially in environments where multiple users with varying trust levels coexist. Attackers or malicious insiders with authenticated access can exploit this flaw to view or manipulate mailing lists beyond their privileges, which could result in privacy violations, reputational damage, and regulatory compliance issues related to data protection laws such as GDPR. Although the vulnerability does not allow for denial of service or remote code execution, the unauthorized access to sensitive mailing list information can facilitate further attacks such as phishing or social engineering campaigns. The impact is particularly significant for organizations that handle large subscriber bases or sensitive communications, including marketing firms, media companies, and enterprises using listmonk for internal or external communications.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all listmonk installations to version 6.1.0 or later, where the authorization bypass bug has been fixed. Until the upgrade can be performed, administrators should restrict multi-user access to trusted personnel only and consider disabling multi-user features if feasible. Implement strict access controls and monitor user activities for unusual access patterns to mailing lists. Conduct regular audits of user permissions to ensure least privilege principles are enforced. Additionally, network segmentation and VPN access controls can limit exposure of the listmonk management interface to trusted networks. Employ logging and alerting mechanisms to detect unauthorized access attempts. Finally, maintain up-to-date backups of mailing list data to recover from any unauthorized modifications. Organizations should also review their incident response plans to address potential data exposure incidents stemming from this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, India, Japan, South Korea
CVE-2026-34584: CWE-639: Authorization Bypass Through User-Controlled Key in knadh listmonk
Description
listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, bugs in list permission checks allows users in a multi-user environment to access to lists (which they don't have access to) under different scenarios. This only affects multi-user environments with untrusted users. This issue has been patched in version 6.1.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34584 is an authorization bypass vulnerability identified in the listmonk newsletter and mailing list manager software, specifically affecting versions from 4.1.0 up to but not including 6.1.0. Listmonk is a self-hosted platform used to manage mailing lists and newsletters, often deployed in multi-user environments. The vulnerability arises due to bugs in the permission checking logic that improperly validate user access rights to mailing lists. This flaw allows authenticated users with limited privileges to access mailing lists they are not authorized to view or manage by manipulating user-controlled keys used in authorization decisions. The underlying weakness corresponds to CWE-639, which involves authorization bypass through user-controlled keys. Exploitation requires network access and authenticated user privileges but does not require user interaction, making it relatively straightforward for insiders or compromised accounts to leverage. The vulnerability impacts confidentiality and integrity by exposing mailing list data and potentially allowing unauthorized modifications. The issue has been addressed and patched in listmonk version 6.1.0. No public exploits have been reported so far, but the medium CVSS score of 5.4 reflects the moderate risk posed by this flaw in environments with untrusted users. Organizations running affected versions should prioritize upgrading to the patched release to prevent unauthorized data access and maintain secure multi-user operations.
Potential Impact
This vulnerability can lead to unauthorized access to mailing lists within listmonk deployments, compromising the confidentiality of subscriber data and potentially the integrity of mailing list content. Organizations relying on listmonk for managing newsletters and communications may face data leakage risks, especially in environments where multiple users with varying trust levels coexist. Attackers or malicious insiders with authenticated access can exploit this flaw to view or manipulate mailing lists beyond their privileges, which could result in privacy violations, reputational damage, and regulatory compliance issues related to data protection laws such as GDPR. Although the vulnerability does not allow for denial of service or remote code execution, the unauthorized access to sensitive mailing list information can facilitate further attacks such as phishing or social engineering campaigns. The impact is particularly significant for organizations that handle large subscriber bases or sensitive communications, including marketing firms, media companies, and enterprises using listmonk for internal or external communications.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all listmonk installations to version 6.1.0 or later, where the authorization bypass bug has been fixed. Until the upgrade can be performed, administrators should restrict multi-user access to trusted personnel only and consider disabling multi-user features if feasible. Implement strict access controls and monitor user activities for unusual access patterns to mailing lists. Conduct regular audits of user permissions to ensure least privilege principles are enforced. Additionally, network segmentation and VPN access controls can limit exposure of the listmonk management interface to trusted networks. Employ logging and alerting mechanisms to detect unauthorized access attempts. Finally, maintain up-to-date backups of mailing list data to recover from any unauthorized modifications. Organizations should also review their incident response plans to address potential data exposure incidents stemming from this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-30T16:56:30.999Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cead0fe6bfc5ba1df1809d
Added to database: 4/2/2026, 5:53:19 PM
Last enriched: 4/2/2026, 6:09:43 PM
Last updated: 4/3/2026, 5:53:35 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.