CVE-2026-3020
Description
Identity based authorization bypass vulnerability (IDOR) that allows an attacker to modify the data of a legitimate user account, such as changing the victim's email address, validating the new email address, and requesting a new password. This could allow them to take complete control of other users' legitimate accounts
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An IDOR in Wakyma web app lets attackers modify a victim's email, validate it, and request a password reset, leading to full account takeover.
Vulnerability
Overview CVE-2026-3020 is an identity-based authorization bypass (IDOR) vulnerability in the Wakyma web application, a management and marketing platform for veterinary centers [1]. The root cause is the application's failure to properly verify that the authenticated user is authorized to modify the data of a specific target account. This allows an authenticated attacker to manipulate requests that reference a victim user's identifier without appropriate access control checks [1].
Exploitation
The attack can be carried out remotely over the network by an authenticated attacker with low privileges; no user interaction is required [1]. By leveraging the IDOR, the attacker can perform sensitive operations on behalf of another user, such as changing the victim's email address, validating the new email, and requesting a new password for the victim's account [1]. These actions do not require the victim to be tricked or to perform any action themselves.
Impact
Successful exploitation grants the attacker the ability to take complete control of the victim's legitimate account [1]. Once the email is changed and a password reset is triggered, the attacker can set a new password and log in as the victim. This compromise can lead to unauthorized access to sensitive data managed through the veterinary center's software, with potential consequences for data confidentiality and integrity of the affected user's account (CVSS v4.0 base score 8.6, High severity) [1].
Mitigation
The vendor, Wakyma, resolved the vulnerability in the continuous integration pipeline deployed to production as of February 19, 2026 [1]. Users of the Wakyma web application are advised to ensure they are running the latest version from that date or later. No workarounds are mentioned in the advisory; applying the vendor's fix is the recommended course of action [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Wakyma/Wakyma application webv5Range: all versions
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.