Description
Netmaker makes networks with WireGuard. Prior to version 1.5.0, the user update handler (PUT /api/users/{username}) lacks validation to prevent an admin-role user from assigning the super-admin role during account updates. While the code correctly blocks an admin from assigning the admin role to another user, it does not include an equivalent check for the super-admin role. This issue has been patched in version 1.5.0.
Published: 2026-03-07
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation to Super-Admin
Action: Patch Immediately
AI Analysis

Impact

The Netmaker API endpoint for updating user accounts contains a missing authorization check that allows an administrator to elevate their privileges to super‑admin. When a user with the admin role sends a request to the user update handler and sets the role field to super‑admin, the server accepts the change because the code only prevents admins from giving other users the admin role. The result is that a regular admin can obtain full control over the entire Netmaker platform, including network configuration, user management, and deployment of WireGuard nodes, effectively bypassing the intended role hierarchy.

Affected Systems

The flaw exists in all deployments of gravitl:netmaker that are running versions earlier than 1.5.0. Administrators operating these installations are at risk if their API token or web session is compromised or if they use weak authentication for the API.

Risk and Exploitability

The vulnerability has a CVSS score of 6.9, indicating moderate severity. The EPSS score is less than 1%, suggesting a low probability of exploitation in the wild, and it is not currently listed in the CISA KEV catalog. However, the attack vector is straightforward: an attacker who can authenticate as an admin and issue an HTTPS request to the update endpoint can supply a super‑admin role value. Because the API uses bearer tokens, credential compromise or social engineering can provide the necessary access. The lack of an additional role‑check allows the privilege escalation without any other prerequisites.

Generated by OpenCVE AI on April 16, 2026 at 10:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Netmaker to version 1.5.0 or newer, which implements the proper role validation check.
  • Audit existing user accounts to identify and revoke any super‑admin roles that were incorrectly granted by an admin before the patch.
  • Configure the user update API so that only users with super‑admin status can modify role assignments, applying additional role‑based access control or middleware to enforce this rule.

Generated by OpenCVE AI on April 16, 2026 at 10:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-ch3w-9456-38v3 Netmaker has Privilege Escalation from Admin to Super-Admin via User Update
History

Thu, 12 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gravitl:netmaker:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Gravitl
Gravitl netmaker
Vendors & Products Gravitl
Gravitl netmaker

Sat, 07 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description Netmaker makes networks with WireGuard. Prior to version 1.5.0, the user update handler (PUT /api/users/{username}) lacks validation to prevent an admin-role user from assigning the super-admin role during account updates. While the code correctly blocks an admin from assigning the admin role to another user, it does not include an equivalent check for the super-admin role. This issue has been patched in version 1.5.0.
Title Netmaker: Privilege Escalation from Admin to Super-Admin via User Update
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Gravitl Netmaker
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T18:25:40.804Z

Reserved: 2026-03-04T14:44:00.715Z

Link: CVE-2026-29195

cve-icon Vulnrichment

Updated: 2026-03-09T17:38:54.242Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T17:15:51.843

Modified: 2026-03-12T13:57:57.343

Link: CVE-2026-29195

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:00:10Z

Weaknesses