Description
Lack of proper authorization implementation in the CashDro 3 web administration panel, version 24.01.00.26. The backend lacks authorization controls, leaving security entirely to the frontend. By modifying the binary string in the ‘Permissions’ field of the JSON response, an attacker could escalate privileges and gain full administrative access. This vulnerability allows all restrictions to be bypassed and completely compromises system management.
Published: 2026-05-08
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability stems from a missing backend authorization mechanism in the CashDro 3 administration panel, version 24.01.00.26. As a result, the application relies solely on client‑side checks. By tampering with the binary string in the Permissions field of the JSON response, an attacker can bypass all existing protections and obtain unrestricted administrative privileges. This flaw constitutes a flaw in access control (CWE‑862) and enables complete takeover of the management interface.

Affected Systems

The CashDro 3 Administration Panel, specifically version 24.01.00.26 of the software, is affected. The fix has been incorporated into the supported release 26.01.00.16, which is the only version currently available on the distribution repository; older releases have been removed for security reasons.

Risk and Exploitability

The CVSS score of 8.6 categorizes this exploit as a high‑severity issue. The EPSS score is unavailable, but the lack of existing mitigations suggests a non‑negligible exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Attackers would most likely exploit the flaw remotely via the web administration interface, assuming the panel is reachable over the network.

Generated by OpenCVE AI on May 8, 2026 at 15:13 UTC.

Remediation

Vendor Solution

The fix has been incorporated into the supported versions of the product. The currently supported version, which is required for the update, is 26.01.00.16. Previous versions have been removed from the distribution repository for security reasons.


OpenCVE Recommended Actions

  • Upgrade the CashDro 3 Administration Panel to at least version 26.01.00.16, which contains the vendor‑provided fix.
  • Limit external exposure of the admin interface by restricting access to trusted IP ranges or internal networks.
  • Enable multi‑factor authentication for all administrative accounts to add an additional barrier against credential compromise.

Generated by OpenCVE AI on May 8, 2026 at 15:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 08 May 2026 13:00:00 +0000

Type Values Removed Values Added
Description Lack of proper authorization implementation in the CashDro 3 web administration panel, version 24.01.00.26. The backend lacks authorization controls, leaving security entirely to the frontend. By modifying the binary string in the ‘Permissions’ field of the JSON response, an attacker could escalate privileges and gain full administrative access. This vulnerability allows all restrictions to be bypassed and completely compromises system management.
Title Weak credentials vulnerability in the CashDro 3 web administration panel
First Time appeared Cashdro
Cashdro cashdro 3 Administration Panel
Weaknesses CWE-862
CPEs cpe:2.3:a:cashdro:cashdro_3_administration_panel:24.01.00.26:*:*:*:*:*:*:*
Vendors & Products Cashdro
Cashdro cashdro 3 Administration Panel
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Cashdro Cashdro 3 Administration Panel
cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2026-05-08T14:01:44.441Z

Reserved: 2026-05-07T11:13:52.107Z

Link: CVE-2026-8077

cve-icon Vulnrichment

Updated: 2026-05-08T14:01:27.338Z

cve-icon NVD

Status : Deferred

Published: 2026-05-08T13:16:49.530

Modified: 2026-05-08T15:51:08.590

Link: CVE-2026-8077

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T15:15:10Z

Weaknesses