Description
An improper authorization vulnerability in the /api/v1/users/{id} endpoint of Snipe-IT v8.4.0 allows authenticated attackers with the users.edit permission to modify sensitive authentication and account-state fields of other non-admin users via supplying a crafted PUT request.
Published: 2026-04-14
Score: n/a
EPSS: n/a
KEV: No
Impact: Account Hijacking via Improper Authorization
Action: Immediate Patch
AI Analysis

Impact

An improper authorization flaw allows an attacker who is already logged in and holds users.edit permission to send a crafted PUT request to the /api/v1/users/{id} endpoint and alter sensitive authentication and account‑state fields for another non‑admin user. If exploited, this can let the attacker change another user’s password, unlock or lock the account, or otherwise manipulate authentication details, effectively permitting account takeover or denial of service against that user.

Affected Systems

The vulnerability is present in Snipe‑IT Version 8.4.0, the open‑source asset management web application. Only users who are not administrators but possess the users.edit permission can be targeted, while admin accounts are not affected by this specific flaw.

Risk and Exploitability

The CVSS score is not disclosed, and EPSS data is unavailable; the vulnerability is not listed in the CISA KEV catalog. The attacker must first authenticate to the API with a valid credential and possess the users.edit permission, indicating that privileged access is required. Once obtained, the misuse of that permission allows modification of another user’s sensitive fields, raising the potential for privilege escalation, data compromise, and service disruption. The lack of an official patch or workaround means the risk remains until an updated version is deployed or permissions are tightened.

Generated by OpenCVE AI on April 14, 2026 at 16:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Snipe‑IT release that contains the fix for this issue.
  • If a fix is not yet released, immediately revoke the users.edit permission from all non‑admin accounts to prevent further unauthorized changes.
  • Audit user accounts to detect any unauthorized alterations to authentication or account‑state fields performed after the vulnerability was discovered.
  • Continuously monitor API logs for suspicious PUT requests to /api/v1/users to detect potential exploitation attempts.

Generated by OpenCVE AI on April 14, 2026 at 16:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Improper Authorization Enables Modification of Authentication Fields in Snipe‑IT
Weaknesses CWE-285

Tue, 14 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Description An improper authorization vulnerability in the /api/v1/users/{id} endpoint of Snipe-IT v8.4.0 allows authenticated attackers with the users.edit permission to modify sensitive authentication and account-state fields of other non-admin users via supplying a crafted PUT request.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-14T15:21:08.509Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-38533

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-14T16:16:43.963

Modified: 2026-04-14T16:16:43.963

Link: CVE-2026-38533

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:31:35Z

Weaknesses