VYPR
Critical severity9.9NVD Advisory· Published Apr 20, 2026· Updated Apr 27, 2026

CVE-2026-30269

CVE-2026-30269

Description

Improper access control in Doorman v0.1.0 and v1.0.2 allows any authenticated user to update their own account role to a non-admin privileged role via /platform/user/{username}. The role field is accepted by the update model without a manage_users permission check for self-updates, enabling privilege escalation to high-privileged roles.

Affected products

2
  • Doorman/Doorman2 versions
    cpe:2.3:a:doorman:doorman:0.1.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:doorman:doorman:0.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:doorman:doorman:1.0.2:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

1