Improper access control in Doorman v0.1.0 and v1.0.2 allows any authenticated user to update their own account role to a non-admin privileged role via /platform/user/{username}. The `role` field is accepted by the update model without a manage_users permission check for self-updates, enabling privilege escalation to high-privileged roles.
References
| Link | Resource |
|---|---|
| https://blog.orxiain.life/archives/cve-2026-30269---improper-access-control-in-doorman-allows-privilege-escalation | Exploit Third Party Advisory |
| https://github.com/apidoorman/doorman | Product |
Configurations
Configuration 1 (hide)
|
History
27 Apr 2026, 15:24
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:doorman:doorman:0.1.0:*:*:*:*:*:*:* cpe:2.3:a:doorman:doorman:1.0.2:*:*:*:*:*:*:* |
|
| First Time |
Doorman
Doorman doorman |
|
| References | () https://blog.orxiain.life/archives/cve-2026-30269---improper-access-control-in-doorman-allows-privilege-escalation - Exploit, Third Party Advisory | |
| References | () https://github.com/apidoorman/doorman - Product |
20 Apr 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.9 |
| CWE | CWE-269 |
20 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-20 17:16
Updated : 2026-04-27 15:24
NVD link : CVE-2026-30269
Mitre link : CVE-2026-30269
CVE.ORG link : CVE-2026-30269
JSON object : View
Products Affected
doorman
- doorman
CWE
CWE-269
Improper Privilege Management
