Description
The vulnerability exists in BLUVOYIX due to improper authentication in the BLUVOYIX admin APIs. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable admin API to create a new user with admin privileges. Successful exploitation of this vulnerability could allow the attacker to gain full access to customers' data and completely compromise the targeted platform by logging in to the newly-created admin user.
Published: 2026-01-14
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation to Administrators
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker to create an administrator account without authentication. Sending crafted HTTP requests to the admin API triggers the flaw, giving the attacker full control over the platform and customer data. The weakness arises from improper authentication and privilege management as captured by CWE‑269 and CWE‑306.

Affected Systems

Bluspark Global’s BLUVOYIX platform is affected. Any deployed instance lacking a recent patch is susceptible; the description does not specify version ranges, so all current releases should be reviewed for the fix.

Risk and Exploitability

With a CVSS score of 10 the flaw is classified as critical. Although the EPSS score is below 1 % suggesting low current exploitation likelihood, the remote nature and zero‑authentication requirement mean the risk of compromise remains high. The vulnerability is not yet listed in KEV, but organizations with BLUVOYIX exposed to the Internet should be treated as high‑risk targets. Attacks would proceed by sending unauthenticated HTTP requests from any external host.

Generated by OpenCVE AI on April 18, 2026 at 06:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑released patch or upgrade to the latest version of BLUVOYIX to fix the authentication flaw.
  • Restrict access to the BLUVOYIX admin API to trusted networks or IP ranges, disabling external exposure when possible.
  • Enforce stronger authentication for the API, such as mutual TLS or API keys, and require regular credential rotation.
  • Enable logging and monitoring of admin API usage, and set alerts for anomalous creation of administrator accounts.

Generated by OpenCVE AI on April 18, 2026 at 06:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Mon, 02 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Blusparkglobal
Blusparkglobal bluvoyix
CPEs cpe:2.3:a:blusparkglobal:bluvoyix:-:*:*:*:*:*:*:*
Vendors & Products Blusparkglobal
Blusparkglobal bluvoyix
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 15 Jan 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Bluspark Global
Bluspark Global bluvoyix
Vendors & Products Bluspark Global
Bluspark Global bluvoyix

Wed, 14 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description The vulnerability exists in BLUVOYIX due to improper authentication in the BLUVOYIX admin APIs. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable admin API to create a new user with admin privileges. Successful exploitation of this vulnerability could allow the attacker to gain full access to customers' data and completely compromise the targeted platform by logging in to the newly-created admin user.
Title Administrator Account Creation Vulnerability in BLUVOYIX
Weaknesses CWE-269
CWE-306
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/RE:H/U:Red'}


Subscriptions

Bluspark Global Bluvoyix
Blusparkglobal Bluvoyix
cve-icon MITRE

Status: PUBLISHED

Assigner: MHV

Published:

Updated: 2026-01-14T15:00:10.766Z

Reserved: 2026-01-06T23:20:59.365Z

Link: CVE-2026-22238

cve-icon Vulnrichment

Updated: 2026-01-14T15:00:05.789Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-14T15:16:05.090

Modified: 2026-02-02T15:51:24.527

Link: CVE-2026-22238

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:30:25Z

Weaknesses