No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 01 Apr 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in z-9527 admin 1.0/2.0. This impacts an unknown function of the file /server/routes/user.js of the component User Update Endpoint. Such manipulation of the argument isAdmin with the input 1 leads to dynamically-determined object attributes. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | z-9527 admin User Update Endpoint user.js dynamically-determined object attributes | |
| Weaknesses | CWE-913 CWE-915 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-01T02:30:14.392Z
Reserved: 2026-03-31T16:11:37.477Z
Link: CVE-2026-5251
No data.
Status : Received
Published: 2026-04-01T03:15:59.050
Modified: 2026-04-01T03:15:59.050
Link: CVE-2026-5251
No data.
OpenCVE Enrichment
No data.