Critical severity9.9NVD Advisory· Published Apr 20, 2026· Updated Apr 27, 2026
CVE-2026-30269
CVE-2026-30269
Description
Improper access control in Doorman v0.1.0 and v1.0.2 allows any authenticated user to update their own account role to a non-admin privileged role via /platform/user/{username}. The role field is accepted by the update model without a manage_users permission check for self-updates, enabling privilege escalation to high-privileged roles.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- blog.orxiain.life/archives/cve-2026-30269---improper-access-control-in-doorman-allows-privilege-escalationnvdExploitThird Party Advisory
News mentions
1- Great responsibility, without great powerCisco Talos Intelligence · Apr 30, 2026