Impact
The vulnerability arises from missing access‑control checks in MantisBT’s ProjectUsersAddCommand module. A user with the manage_project_threshold role (managers by default) can craft a request that assigns the administrator access level to any user in any project where they hold manager rights. Although this grants project‑level administrator privileges rather than global system rights, it still elevates the user’s authority within that project and may allow operations that managers would normally perform. This is a classic privilege‑escalation flaw (CWE‑284).
Affected Systems
The flaw affects the open‑source Mantis Bug Tracker from the mantisbt:mantisbt vendor. All releases up to and including version 2.28.1 are vulnerable. The issue was resolved starting with version 2.28.2. Users running earlier releases are affected.
Risk and Exploitability
The CVSS score of 5.1 indicates a moderate risk. No EPSS value is available, and the vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that the attack vector involves a web‑based request to the project‑user‑add handler; an authenticated manager can submit a forged access_level value. Because the flaw requires only existing managerial privileges, it is potentially exploitable by any manager who chooses to abuse it. This risk is moderate but still actionable.
OpenCVE Enrichment
Github GHSA