CVE-2026-30269

Improper access control in Doorman v0.1.0 and v1.0.2 allows any authenticated user to update their own account role to a non-admin privileged role via /platform/user/{username}. The `role` field is accepted by the update model without a manage_users permission check for self-updates, enabling privilege escalation to high-privileged roles.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:doorman:doorman:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:doorman:doorman:1.0.2:*:*:*:*:*:*:*

History

27 Apr 2026, 15:24

Type Values Removed Values Added
CPE cpe:2.3:a:doorman:doorman:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:doorman:doorman:1.0.2:*:*:*:*:*:*:*
First Time Doorman
Doorman doorman
References () https://blog.orxiain.life/archives/cve-2026-30269---improper-access-control-in-doorman-allows-privilege-escalation - () https://blog.orxiain.life/archives/cve-2026-30269---improper-access-control-in-doorman-allows-privilege-escalation - Exploit, Third Party Advisory
References () https://github.com/apidoorman/doorman - () https://github.com/apidoorman/doorman - Product

20 Apr 2026, 19:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.9
CWE CWE-269

20 Apr 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-20 17:16

Updated : 2026-04-27 15:24


NVD link : CVE-2026-30269

Mitre link : CVE-2026-30269

CVE.ORG link : CVE-2026-30269


JSON object : View

Products Affected

doorman

  • doorman
CWE
CWE-269

Improper Privilege Management