Description
mpGabinet is vulnerable to Privilege Escalation due to excessive database privileges assigned to the user used by the application. An attacker with access to any running application instance connected to the backend server can extract database credentials from the application’s memory by inspecting the running process. While ability to retrieve credentials from memory is expected behavior, the exposed credentials grant administrative access to the database, exceeding the privileges required for normal application functionality. This allows an attacker to perform actions beyond those permitted through the application interface.


This issue affects mpGabinet version 23.12.19 and below.
Published: 2026-04-28
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

mpGabinet was found to assign too many database privileges to the user account it relies on. An attacker who can observe a running instance of the application can read the database credentials from the process memory. Although reading memory may be expected in some scenarios, the exposed credentials provide administrative rights to the database, giving the attacker permissions far beyond normal application functionality. This represents a privilege escalation vulnerability consistent with CWE‑250.

Affected Systems

The vulnerability affects BinSoft’s mpGabinet software version 23.12.19 and all earlier releases.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity. The exploit probability is not publicly available, and the issue is not listed in CISA’s KEV catalog. The most likely attack path involves an attacker gaining local or remote access to a running application instance and probing the process memory to retrieve database credentials, which is then leveraged to obtain administrative database actions. Adequate hardening of process visibility and privilege reductions can mitigate this risk.

Generated by OpenCVE AI on April 28, 2026 at 19:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade mpGabinet to a version newer than 23.12.19 to eliminate the excessive database privileges.
  • Configure the application’s database user with the minimum privileges required for normal operation to reduce the impact of any credential compromise.
  • Implement OS or container hardening controls, such as restricting who can inspect process memory or running the application with the least possible permissions, to prevent credential extraction from memory.

Generated by OpenCVE AI on April 28, 2026 at 19:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Binsoft
Binsoft mpgabinet
Vendors & Products Binsoft
Binsoft mpgabinet

Tue, 28 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description mpGabinet is vulnerable to Privilege Escalation due to excessive database privileges assigned to the user used by the application. An attacker with access to any running application instance connected to the backend server can extract database credentials from the application’s memory by inspecting the running process. While ability to retrieve credentials from memory is expected behavior, the exposed credentials grant administrative access to the database, exceeding the privileges required for normal application functionality. This allows an attacker to perform actions beyond those permitted through the application interface. This issue affects mpGabinet version 23.12.19 and below.
Title Privilege Escalation in mpGabinet
Weaknesses CWE-250
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Binsoft Mpgabinet
cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2026-04-28T14:15:43.721Z

Reserved: 2026-04-14T09:44:32.552Z

Link: CVE-2026-40550

cve-icon Vulnrichment

Updated: 2026-04-28T14:15:37.643Z

cve-icon NVD

Status : Deferred

Published: 2026-04-28T14:16:13.337

Modified: 2026-04-28T20:20:09.767

Link: CVE-2026-40550

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T10:10:45Z

Weaknesses