Description
A vulnerability has been found in eladmin up to 2.7. Impacted is the function checkLevel of the file /rest/UserController.java of the component Users API Endpoint. Such manipulation leads to improper access controls. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In eladmin, the function checkLevel in the Users API Endpoint allows an attacker to manipulate request parameters to force the server to treat a lower privilege user as a higher privilege user. The flaw is an improper access control weakness, classified as CWE‑266 and CWE‑284. If exploited, an attacker could read or modify sensitive data, gain unauthorized administrative capabilities, or otherwise compromise user information protected by the application.

Affected Systems

The vulnerability affects the eladmin web administration product in all releases up to version 2.7. No specific fixed version has been released yet, and the vendor has not responded to the issue report, so all installations running 2.7 or earlier remain vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. Although an EPSS score is not available, the vulnerability is listed as not present in the CISA KEV catalog. The attack can be carried out remotely by sending crafted requests to the /rest/UserController endpoint. Because no patch is currently available, the primary risk is that any authenticated user could elevate privileges if the application logic does not properly validate the required level.

Generated by OpenCVE AI on May 8, 2026 at 03:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‐released patch for eladmin once a fix is available; if no patch is offered, verify whether a newer version beyond 2.7 addresses the checkLevel flaw.
  • Configure the application to enforce strict role‐based access checks on the Users API endpoint, ensuring that the caller’s actual role matches the requested level before any sensitive operation is performed.
  • Limit exposure of the vulnerable API by placing the service behind a firewall, API gateway, or WAF that permits only trusted IP ranges or internal network access to the /rest/UserController endpoint.

Generated by OpenCVE AI on May 8, 2026 at 03:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 08 May 2026 05:00:00 +0000

Type Values Removed Values Added
First Time appeared Elunez
Elunez eladmin
Vendors & Products Elunez
Elunez eladmin

Fri, 08 May 2026 02:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in eladmin up to 2.7. Impacted is the function checkLevel of the file /rest/UserController.java of the component Users API Endpoint. Such manipulation leads to improper access controls. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title eladmin Users API Endpoint UserController.java checkLevel access control
First Time appeared Eladmin
Eladmin eladmin
Weaknesses CWE-266
CWE-284
CPEs cpe:2.3:a:eladmin:eladmin:*:*:*:*:*:*:*:*
Vendors & Products Eladmin
Eladmin eladmin
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-08T14:11:52.923Z

Reserved: 2026-05-07T17:22:53.696Z

Link: CVE-2026-8127

cve-icon Vulnrichment

Updated: 2026-05-08T14:11:49.708Z

cve-icon NVD

Status : Deferred

Published: 2026-05-08T03:16:25.350

Modified: 2026-05-08T15:47:03.413

Link: CVE-2026-8127

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T05:00:06Z

Weaknesses