Description
An improper authorization vulnerability in the /api/v1/users/{id} endpoint of Snipe-IT v8.4.0 allows authenticated attackers with the users.edit permission to modify sensitive authentication and account-state fields of other non-admin users via supplying a crafted PUT request.
Published: 2026-04-14
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Account Hijacking via Improper Authorization
Action: Immediate Patch
AI Analysis

Impact

An improper authorization flaw allows an attacker who is already logged in and holds users.edit permission to send a crafted PUT request to the /api/v1/users/{id} endpoint and alter sensitive authentication and account‑state fields for another non‑admin user. If exploited, this can let the attacker change another user’s password, unlock or lock the account, or otherwise manipulate authentication details, effectively permitting account takeover or denial of service against that user.

Affected Systems

The vulnerability is present in Snipe‑IT Version 8.4.0, the open‑source asset management web application. Only users who are not administrators but possess the users.edit permission can be targeted, while admin accounts are not affected by this specific flaw.

Risk and Exploitability

The CVSS score is 6.5, and the EPSS score is < 1%, indicating a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attacker must first authenticate to the API with a valid credential and possess the users.edit permission, indicating that privileged access is required. Once obtained, the misuse of that permission allows modification of another user’s sensitive fields, raising the potential for privilege escalation, data compromise, and service disruption. The lack of an official patch or workaround means the risk remains until an updated version is deployed or permissions are tightened.

Generated by OpenCVE AI on April 17, 2026 at 08:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Snipe‑IT release that contains the fix for this issue.
  • If a fix is not yet released, immediately revoke the users.edit permission from all non‑admin accounts to prevent further unauthorized changes.
  • Audit user accounts to detect any unauthorized alterations to authentication or account‑state fields performed after the vulnerability was discovered.
  • Continuously monitor API logs for suspicious PUT requests to /api/v1/users to detect potential exploitation attempts.

Generated by OpenCVE AI on April 17, 2026 at 08:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:snipeitapp:snipe-it:8.4.0:*:*:*:*:*:*:*

Fri, 17 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Title Improper Authorization Enables Modification of Authentication Fields in Snipe‑IT

Thu, 16 Apr 2026 13:30:00 +0000

Type Values Removed Values Added
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


Wed, 15 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Snipeitapp
Snipeitapp snipe-it
Vendors & Products Snipeitapp
Snipeitapp snipe-it

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Improper Authorization Enables Modification of Authentication Fields in Snipe‑IT
Weaknesses CWE-285

Tue, 14 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Description An improper authorization vulnerability in the /api/v1/users/{id} endpoint of Snipe-IT v8.4.0 allows authenticated attackers with the users.edit permission to modify sensitive authentication and account-state fields of other non-admin users via supplying a crafted PUT request.
References

Subscriptions

Snipeitapp Snipe-it
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-16T12:06:16.556Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-38533

cve-icon Vulnrichment

Updated: 2026-04-16T11:40:49.846Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-14T16:16:43.963

Modified: 2026-05-01T15:23:59.303

Link: CVE-2026-38533

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T09:00:10Z

Weaknesses