Description
Sulu is an open-source PHP content management system based on the Symfony framework. From versions 1.0.0 to before 2.6.22, and 3.0.0 to before 3.0.5, a user which has permission for the Sulu Admin via at least one role could have access to the sub-entities of contacts via the admin API without even have permission for contacts. This issue has been patched in versions 2.6.22 and 3.0.5.
Published: 2026-03-31
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized data access via admin API
Action: Update Sulu
AI Analysis

Impact

The vulnerability exists in the open-source Sulu content management system, a PHP-based platform built on the Symfony framework. A flaw in the permission checks for certain admin API endpoints allows a user who holds any Sulu Admin role to retrieve sub-entities of contacts even when that user lacks explicit permission for the contacts themselves. This authorization bypass enables an attacker to read sensitive contact data through the API, potentially exposing personally identifiable information. The flaw does not provide remote code execution or denial of service; it is purely an information disclosure issue caused by improper access control.

Affected Systems

Sulu CMS versions from 1.0.0 up to, but not including, 2.6.22 and from 3.0.0 up to, but not including, 3.0.5. The issue affects the admin API that serves sub-entity data of contacts. Any deployment of these affected releases that permits users to obtain an Sulu Admin role is vulnerable.

Risk and Exploitability

The Common Vulnerability Scoring System assigns a medium severity with a score of 5.3, and the Exploit Prediction Scoring System rate is below 1%, indicating low exploitation likelihood. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Attackers would need authenticated access to the Sulu admin API with an admin role, which implies a trusted or compromised account. The attack vector is through HTTP requests to the backend API, so the threat is primarily internal or from compromised credentials. While most chances for exploitation are mitigated by credential protection, any compromise of an admin account would make the flaw immediately actionable.

Generated by OpenCVE AI on April 10, 2026 at 02:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Sulu to version 2.6.22 or later
  • Upgrade Sulu to version 3.0.5 or later
  • Verify that no older releases are in use
  • Restrict admin role assignments to only trusted users

Generated by OpenCVE AI on April 10, 2026 at 02:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6h7h-m7p5-hjqp Sulu checks fix permissions for subentities endpoints
History

Fri, 10 Apr 2026 01:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}


Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Sulu
Sulu sulu
Vendors & Products Sulu
Sulu sulu

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description Sulu is an open-source PHP content management system based on the Symfony framework. From versions 1.0.0 to before 2.6.22, and 3.0.0 to before 3.0.5, a user which has permission for the Sulu Admin via at least one role could have access to the sub-entities of contacts via the admin API without even have permission for contacts. This issue has been patched in versions 2.6.22 and 3.0.5.
Title Sulu checks fix permissions for subentities endpoints
Weaknesses CWE-288
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T20:29:14.584Z

Reserved: 2026-03-27T13:43:14.369Z

Link: CVE-2026-34372

cve-icon Vulnrichment

Updated: 2026-03-31T20:29:09.677Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T21:16:29.840

Modified: 2026-04-10T01:40:29.000

Link: CVE-2026-34372

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:45:55Z

Weaknesses