Cronicle is a multi-server task scheduler and runner, with a web based front-end UI. Prior to 0.9.111, jb child processes can include an update_event key in their JSON output. The server applies this directly to the parent event's stored configuration without any authorization check. A low-privilege user who can create and run events can modify any event property, including webhook URLs and notification emails. This vulnerability is fixed in 0.9.111.
References
| Link | Resource |
|---|---|
| https://github.com/jhuckaby/Cronicle/security/advisories/GHSA-5j3v-cq96-xw6v | Exploit Vendor Advisory |
| https://github.com/jhuckaby/Cronicle/security/advisories/GHSA-5j3v-cq96-xw6v | Exploit Vendor Advisory |
Configurations
History
15 Apr 2026, 20:23
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Cronicle
Cronicle cronicle |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| References | () https://github.com/jhuckaby/Cronicle/security/advisories/GHSA-5j3v-cq96-xw6v - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:cronicle:cronicle:*:*:*:*:*:*:*:* |
08 Apr 2026, 17:21
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/jhuckaby/Cronicle/security/advisories/GHSA-5j3v-cq96-xw6v - |
07 Apr 2026, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-07 21:17
Updated : 2026-04-15 20:23
NVD link : CVE-2026-39401
Mitre link : CVE-2026-39401
CVE.ORG link : CVE-2026-39401
JSON object : View
Products Affected
cronicle
- cronicle
CWE
CWE-862
Missing Authorization
