Vulnerabilities in the My Account and User Management components in CIPPlanner CIPAce before 9.17 allows attackers to escalate their access levels. A low-privileged authenticated user can gain access to other people's accounts by tampering with the client's user id to change their account information. A low-privileged authenticated user can elevate his or her system privileges by modifying the information of a user role that is disabled in the client.
References
| Link | Resource |
|---|---|
| https://cipplanner.com/cve-2024-50619-cve-public-notification-of-resolution/ | Vendor Advisory |
Configurations
History
13 Feb 2026, 21:39
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:cipplanner:cipace:*:*:*:*:*:*:*:* | |
| References | () https://cipplanner.com/cve-2024-50619-cve-public-notification-of-resolution/ - Vendor Advisory | |
| First Time |
Cipplanner cipace
Cipplanner |
12 Feb 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CWE | CWE-269 |
11 Feb 2026, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-11 22:15
Updated : 2026-02-13 21:39
NVD link : CVE-2024-50619
Mitre link : CVE-2024-50619
CVE.ORG link : CVE-2024-50619
JSON object : View
Products Affected
cipplanner
- cipace
CWE
CWE-269
Improper Privilege Management
