VYPR
Moderate severityNVD Advisory· Published Mar 9, 2026· Updated Mar 10, 2026

Admidio: Event participation IDOR - non-leaders can register other users for events via user_uuid parameter

CVE-2026-30927

Description

Admidio is an open-source user management solution. Prior to 5.0.6, in modules/events/events_function.php, the event participation logic allows any user who can participate in an event to register OTHER users by manipulating the user_uuid GET parameter. The condition uses || (OR), meaning if possibleToParticipate() returns true (event is open for participation), ANY user - not just leaders - can specify a different user_uuid and register/cancel participation for that user. The code then operates on $user->getValue('usr_id') (the target user from user_uuid) rather than the current user. This vulnerability is fixed in 5.0.6.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Admidio before 5.0.6 allows any authenticated event participant to register or cancel other users for events by manipulating the user_uuid parameter.

Vulnerability

Overview

The vulnerability resides in the event participation logic within modules/events/events_function.php of Admidio, an open-source user management system prior to version 5.0.6 [1]. The flaw is rooted in an incorrect conditional check that uses an OR (||) operator. When the function possibleToParticipate() returns true (meaning the event is open for participation), any authenticated user—not just designated leaders—can manipulate the user_uuid GET parameter to specify a different user [1]. The code subsequently operates on the target user's ID ($user->getValue('usr_id')) rather than the current authenticated user's ID [1].

Attack

Vector and Prerequisites

To exploit this vulnerability, an attacker must be an authenticated user who is permitted to participate in the target event [1]. No special administrative or leadership privileges are required. The attacker can then craft a request containing a user_uuid parameter pointing to another user. The flawed authorization check only verifies that the attacker is allowed to participate in the event, but fails to ensure that the modification is performed on the attacker's own registration [1]. This bypasses the intended permission model where only event leaders should be able to manage other users' participation [4].

Impact

A successful exploit allows an attacker to register other users for events against their will or cancel their existing participation [1]. In a multi-user context, this could be abused to disrupt event planning, force unwanted registrations that consume spots, or interfere with attendance tracking. The impact is limited to event participation management; it does not lead to arbitrary code execution or direct data exfiltration, but it undermines the integrity of event management and user consent [1].

Mitigation

The vulnerability has been fixed in Admidio version 5.0.6 [1]. The fix ensures that the user identifier used for participation actions is derived from the authenticated session rather than from an externally supplied parameter, and that the authorization check properly distinguishes between a user acting on their own registration and a leader managing others [3]. Users are strongly advised to upgrade to version 5.0.6 or later. There is no known workaround for earlier versions [1][3].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
admidio/admidioPackagist
< 5.0.65.0.6

Affected products

2
  • Admidio/Admidiollm-fuzzy2 versions
    <5.0.6+ 1 more
    • (no CPE)range: <5.0.6
    • (no CPE)range: < 5.0.6

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.