Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, a privilege escalation vulnerability exists in the Joplin server, allowing non-admin users to exploit the API endpoint `PATCH /api/users/:id` to set the `is_admin` field to 1. The vulnerability allows malicious low-privileged users to perform administrative actions without proper authorization. This issue has been patched in version 3.3.3.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-14844 Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, a privilege escalation vulnerability exists in the Joplin server, allowing non-admin users to exploit the API endpoint `PATCH /api/users/:id` to set the `is_admin` field to 1. The vulnerability allows malicious low-privileged users to perform administrative actions without proper authorization. This issue has been patched in version 3.3.3.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 16 May 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Joplin Project
Joplin Project joplin
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*
Vendors & Products Joplin Project
Joplin Project joplin

Wed, 30 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 30 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Description Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, a privilege escalation vulnerability exists in the Joplin server, allowing non-admin users to exploit the API endpoint `PATCH /api/users/:id` to set the `is_admin` field to 1. The vulnerability allows malicious low-privileged users to perform administrative actions without proper authorization. This issue has been patched in version 3.3.3.
Title Privilege escalation in Joplin server via user patch endpoint
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-30T15:11:12.895Z

Reserved: 2025-02-19T16:30:47.774Z

Link: CVE-2025-27134

cve-icon Vulnrichment

Updated: 2025-04-30T15:11:00.407Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-30T15:16:00.927

Modified: 2025-05-16T16:32:35.957

Link: CVE-2025-27134

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.