Description
Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, live logging and log history for cronjobs. Prior to version 2.2.0, an authentication bypass in middleware allows unauthenticated requests with an invalid session cookie to be treated as authenticated when the middleware’s session-validation fetch fails. This can result in unauthorized access to protected pages and unauthorized execution of privileged Next.js Server Actions. This issue has been patched in version 2.2.0.
Published: 2026-04-01
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Immediate Patch
AI Analysis

Impact

A flaw in the middleware authentication checks of Cronmaster allows unauthenticated users to be treated as authenticated when an invalid session cookie results in a failed session‑validation fetch. As a consequence, attackers can view protected pages and trigger privileged Next.js Server Actions without proper credentials. The vulnerability stems from improper session handling (CWE‑287, CWE‑306, CWE‑693).

Affected Systems

The issue affects the fccview Cronmaster application, specifically all releases before version 2.2.0. Any deployment using these older versions is susceptible until patched.

Risk and Exploitability

The CVSS v3 score of 8.3 indicates high severity, while no EPSS data is available and it is not listed in KEV. The likely attack vector is an unauthenticated HTTP request sent to any protected endpoint. If exploited, an attacker could obtain privileged access that may lead to further compromise. Given the lack of a hard‑coded exploitation method in the description, de‑risking requires patching the middleware rather than solely relying on defensive controls.

Generated by OpenCVE AI on April 2, 2026 at 03:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest cronmaster release (v2.2.0) or newer to eliminate the middleware flaw.
  • Verify that no legacy Cronmaster versions remain in production and that the upgraded code is successfully deployed.
  • If an upgrade cannot be performed immediately, enhance network or application‑level access controls to restrict unauthenticated traffic to protected pages.
  • Enable comprehensive logging and actively monitor for anomalous authentication attempts or unauthorized server‑action invocations.

Generated by OpenCVE AI on April 2, 2026 at 03:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Fccview
Fccview cronmaster
Vendors & Products Fccview
Fccview cronmaster

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, live logging and log history for cronjobs. Prior to version 2.2.0, an authentication bypass in middleware allows unauthenticated requests with an invalid session cookie to be treated as authenticated when the middleware’s session-validation fetch fails. This can result in unauthorized access to protected pages and unauthorized execution of privileged Next.js Server Actions. This issue has been patched in version 2.2.0.
Title cronmaster: Middleware authentication bypass enabling unauthorized page access and server-action execution
Weaknesses CWE-287
CWE-306
CWE-693
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Fccview Cronmaster
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-01T17:45:11.248Z

Reserved: 2026-03-25T16:21:40.867Z

Link: CVE-2026-34072

cve-icon Vulnrichment

Updated: 2026-04-01T17:45:06.888Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-01T18:16:29.340

Modified: 2026-04-03T16:10:52.680

Link: CVE-2026-34072

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:17:12Z

Weaknesses