Description
An Authenticated NoSQL Injection vulnerability found in UniFi Network Application could allow a malicious actor with authenticated access to the network to escalate privileges.
Published: 2026-03-19
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via NoSQL Injection
Action: Patch
AI Analysis

Impact

An authenticated NoSQL Injection flaw exists in Ubiquiti’s UniFi Network Application, enabling an attacker who has valid credentials to inject arbitrary database queries. The vulnerability, classified under CWE-943, allows escalation of privileges, potentially granting the attacker elevated access and control over the network’s management functions. According to the vendor’s description, an attacker could modify data and access sensitive information or execute further malicious actions on the affected device.

Affected Systems

The flaw affects Ubiquiti Inc’s UniFi Network Application. No specific version information has been supplied in the advisory, indicating that all current releases may be susceptible until a patch is released. Users should verify whether their deployed version is impacted by reviewing the vendor’s support pages or release notes.

Risk and Exploitability

The CVSS score of 7.7 categorizes this vulnerability as high severity. While EPSS data is not available, the requirement for authenticated access limits its exploitation to insiders or compromised credentials rather than remote attackers. The vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed public exploits to date. Nonetheless, the potential for privilege escalation warrants immediate attention and remediation once a vendor fix becomes available.

Generated by OpenCVE AI on March 19, 2026 at 16:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Ubiquiti’s website or official release notes for a patch or update addressing the NoSQL injection flaw.
  • Restrict or monitor authenticated access to the UniFi Network Application, ensuring least-privilege principles apply.
  • Apply network segmentation or firewall rules to limit lateral movement from compromised accounts.
  • Monitor logs for anomalous database queries or elevated privilege activity.
  • Apply the vendor patch as soon as it is released to eliminate the vulnerability completely.

Generated by OpenCVE AI on March 19, 2026 at 16:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Title Authenticated NoSQL Injection Allowing Privilege Escalation in UniFi Network Application

Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Ubiquiti
Ubiquiti unifi Network Application
Vendors & Products Ubiquiti
Ubiquiti unifi Network Application

Thu, 19 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-943
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description An Authenticated NoSQL Injection vulnerability found in UniFi Network Application could allow a malicious actor with authenticated access to the network to escalate privileges.
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Ubiquiti Unifi Network Application
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2026-03-19T15:04:36.698Z

Reserved: 2026-01-07T15:39:03.440Z

Link: CVE-2026-22558

cve-icon Vulnrichment

Updated: 2026-03-19T15:04:19.179Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-19T15:16:23.697

Modified: 2026-03-20T13:39:46.493

Link: CVE-2026-22558

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:14:53Z

Weaknesses