Description
A blog.admin v.8.0 and before system's getinfobytoken API interface contains an improper access control which leads to sensitive data exposure. Unauthorized parties can obtain sensitive administrator account information via a valid token, threatening system security.
Published: 2026-03-27
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Exposure of Administrator Credentials via API
Action: Apply Patch
AI Analysis

Impact

The BlogAdmin v8.0 system exposes administrator account information through the GetInfoByToken API because the API does not enforce strict access controls. A valid session token allows anyone to retrieve sensitive admin credentials, creating a direct path to credential theft and potential subsequent compromise of the entire system. The weakness is a classic improper access control scenario; it does not alter existing data but provides read access to privileged information, thus threatening confidentiality and potentially enabling lateral movement if the credentials are used by an attacker.

Affected Systems

The vulnerability is present in the anjoy8 BlogAdmin application version 8.0 and all earlier releases. Users running these versions are susceptible because the GetInfoByToken endpoint does not restrict access to authenticated administrators only. No other vendor or product variants were identified in the available data.

Risk and Exploitability

The CVSS score of 7.5 classifies the flaw as high severity, indicating that once an attacker obtains a token, the impact is significant. The EPSS score of less than 1% suggests that community-exploited attacks are currently rare, and the flaw is not listed in the CISA KEV catalog. The likely exploit path requires a valid token, so attackers may need to acquire or forge a token through other vulnerabilities or credential reuse. If a token is available, the exploitation is straightforward and requires no complex steps, which makes the risk higher for impacted installations that expose this API to the public internet.

Generated by OpenCVE AI on April 2, 2026 at 22:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest available patch or upgrade to a newer BlogAdmin release that eliminates the API flaw.
  • Restrict the GetInfoByToken endpoint to a secured network or implement IP whitelisting to prevent external access.
  • Invalidate any currently issued tokens and enforce token rotation policies.
  • Monitor API logs for anomalous access patterns and investigate suspicious requests promptly.
  • Apply the principle of least privilege by ensuring that only authorized administrative users can invoke the GetInfoByToken API.

Generated by OpenCVE AI on April 2, 2026 at 22:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title Improper Access Control in BlogAdmin GetInfoByToken API Exposes Administrator Credentials

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:anjoy8:blog.admin:8.0:*:*:*:*:*:*:*

Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
Title Improper Access Control in BlogAdmin GetInfoByToken API Exposes Administrator Credentials
First Time appeared Anjoy8
Anjoy8 blog.admin
Vendors & Products Anjoy8
Anjoy8 blog.admin

Sun, 29 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Title Improper Access Control in Blog.Admin getinfobytoken API Exposes Admin Credentials
Weaknesses CWE-200
CWE-285

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Title Improper Access Control in Blog.Admin getinfobytoken API Exposes Admin Credentials
Weaknesses CWE-200
CWE-285

Fri, 27 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description A blog.admin v.8.0 and before system's getinfobytoken API interface contains an improper access control which leads to sensitive data exposure. Unauthorized parties can obtain sensitive administrator account information via a valid token, threatening system security.
References

Subscriptions

Anjoy8 Blog.admin
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-27T20:32:29.894Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30689

cve-icon Vulnrichment

Updated: 2026-03-27T20:31:54.015Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T15:16:53.620

Modified: 2026-04-02T19:57:44.627

Link: CVE-2026-30689

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:38:43Z

Weaknesses