Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34584: CWE-639: Authorization Bypass Through User-Controlled Key in knadh listmonk

0
Medium
VulnerabilityCVE-2026-34584cvecve-2026-34584cwe-639
Published: Thu Apr 02 2026 (04/02/2026, 17:31:37 UTC)
Source: CVE Database V5
Vendor/Project: knadh
Product: listmonk

Description

listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, bugs in list permission checks allows users in a multi-user environment to access to lists (which they don't have access to) under different scenarios. This only affects multi-user environments with untrusted users. This issue has been patched in version 6.1.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 18:09:43 UTC

Technical Analysis

CVE-2026-34584 is an authorization bypass vulnerability identified in the listmonk newsletter and mailing list manager software, specifically affecting versions from 4.1.0 up to but not including 6.1.0. Listmonk is a self-hosted platform used to manage mailing lists and newsletters, often deployed in multi-user environments. The vulnerability arises due to bugs in the permission checking logic that improperly validate user access rights to mailing lists. This flaw allows authenticated users with limited privileges to access mailing lists they are not authorized to view or manage by manipulating user-controlled keys used in authorization decisions. The underlying weakness corresponds to CWE-639, which involves authorization bypass through user-controlled keys. Exploitation requires network access and authenticated user privileges but does not require user interaction, making it relatively straightforward for insiders or compromised accounts to leverage. The vulnerability impacts confidentiality and integrity by exposing mailing list data and potentially allowing unauthorized modifications. The issue has been addressed and patched in listmonk version 6.1.0. No public exploits have been reported so far, but the medium CVSS score of 5.4 reflects the moderate risk posed by this flaw in environments with untrusted users. Organizations running affected versions should prioritize upgrading to the patched release to prevent unauthorized data access and maintain secure multi-user operations.

Potential Impact

This vulnerability can lead to unauthorized access to mailing lists within listmonk deployments, compromising the confidentiality of subscriber data and potentially the integrity of mailing list content. Organizations relying on listmonk for managing newsletters and communications may face data leakage risks, especially in environments where multiple users with varying trust levels coexist. Attackers or malicious insiders with authenticated access can exploit this flaw to view or manipulate mailing lists beyond their privileges, which could result in privacy violations, reputational damage, and regulatory compliance issues related to data protection laws such as GDPR. Although the vulnerability does not allow for denial of service or remote code execution, the unauthorized access to sensitive mailing list information can facilitate further attacks such as phishing or social engineering campaigns. The impact is particularly significant for organizations that handle large subscriber bases or sensitive communications, including marketing firms, media companies, and enterprises using listmonk for internal or external communications.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade all listmonk installations to version 6.1.0 or later, where the authorization bypass bug has been fixed. Until the upgrade can be performed, administrators should restrict multi-user access to trusted personnel only and consider disabling multi-user features if feasible. Implement strict access controls and monitor user activities for unusual access patterns to mailing lists. Conduct regular audits of user permissions to ensure least privilege principles are enforced. Additionally, network segmentation and VPN access controls can limit exposure of the listmonk management interface to trusted networks. Employ logging and alerting mechanisms to detect unauthorized access attempts. Finally, maintain up-to-date backups of mailing list data to recover from any unauthorized modifications. Organizations should also review their incident response plans to address potential data exposure incidents stemming from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-30T16:56:30.999Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cead0fe6bfc5ba1df1809d

Added to database: 4/2/2026, 5:53:19 PM

Last enriched: 4/2/2026, 6:09:43 PM

Last updated: 4/3/2026, 5:53:35 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses