Description
A vulnerability was identified in MineAdmin 1.x/2.x. The impacted element is an unknown function of the file /system/cache/view of the component View Interface. The manipulation leads to improper authorization. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper Authorization on MineAdmin view endpoint
Action: Apply Mitigation
AI Analysis

Impact

The vulnerability affects MineAdmin versions 1.x and 2.x and is located in a function of the /system/cache/view file within the View Interface component. By manipulating this endpoint, an adversary can bypass the intended authorization checks and gain access to views or operations that should be restricted. This flaw is remotely exploitable, and an exploit has been made publicly available, allowing a malicious actor to carry out the attack from any network where the target is reachable.

Affected Systems

MineAdmin versions 1.x and 2.x are affected. The Common Platform Enumeration entries list the 1.0 and 2.0 releases. Any installation using these versions is exposed, regardless of deployment size or hosting environment.

Risk and Exploitability

The CVSS v3.1 score of 5.3 indicates a moderate impact, focusing primarily on confidentiality and integrity through improper authorization. The EPSS score of less than 1% suggests that widespread exploitation is unlikely at the present moment, and the vulnerability is not catalogued in the CISA KEV list. Nevertheless, because the flaw can be triggered remotely without special credentials and the exploit is publicly available, administrators should consider remediation early to prevent unauthorized data exposure.

Generated by OpenCVE AI on April 18, 2026 at 04:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a MineAdmin version that addresses the view‑authorization flaw, if such a release is available from the project maintainers.
  • When an updated version is not accessible, limit external access to the /system/cache/view endpoint by applying firewall or ACL rules so that only trusted IP addresses can reach it.
  • Perform a review of MineAdmin role definitions and strip any unnecessary elevated permissions from user accounts that interact with the View Interface.
  • Enable or audit logging for access attempts to the /system/cache/view endpoint to detect potential abuse.

Generated by OpenCVE AI on April 18, 2026 at 04:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-23hh-2f47-3p4h MineAdmin has Incorrect Privilege Assignment
History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mineadmin:mineadmin:*:*:*:*:*:*:*:*

Thu, 05 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mineadmin:mineadmin:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mineadmin:mineadmin:2.0:*:*:*:*:*:*:*

Wed, 21 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Mineadmin
Mineadmin mineadmin
Vendors & Products Mineadmin
Mineadmin mineadmin

Mon, 19 Jan 2026 23:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in MineAdmin 1.x/2.x. The impacted element is an unknown function of the file /system/cache/view of the component View Interface. The manipulation leads to improper authorization. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title MineAdmin View view improper authorization
Weaknesses CWE-266
CWE-285
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Mineadmin Mineadmin
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-25T12:31:53.364Z

Reserved: 2026-01-19T13:59:50.661Z

Link: CVE-2026-1193

cve-icon Vulnrichment

Updated: 2026-01-21T19:44:30.407Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T23:16:03.247

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1193

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:00:06Z

Weaknesses