CVE-2026-41464
Description
ProjeQtor versions 7.0 through 12.4.3 contain a missing authorization vulnerability in the objectDetail.php endpoint that allows authenticated users with guest-level privileges to retrieve sensitive data belonging to other users including password hashes and API keys. Attackers can bypass access controls by directly accessing the endpoint without ownership or role-based validation to extract administrator credentials and perform privilege escalation.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
ProjeQtor 7.0-12.4.3 has missing authorization in objectDetail.php, allowing guest users to access password hashes and API keys of all users, leading to privilege escalation.
Vulnerability
ProjeQtor versions 7.0 through 12.4.3 contain a missing authorization vulnerability in the objectDetail.php endpoint. The endpoint fails to validate whether the authenticated user owns the requested resource or has appropriate role-based permissions, allowing unauthorized access to sensitive data [1][2][3].
Exploitation
An attacker with a guest-level account can remotely access the /view/objectDetail.php endpoint without any additional user interaction. By manipulating parameters such as object identifiers, the attacker can retrieve password hashes and API keys belonging to other users, including administrators [2]. The vulnerability can be exploited over the network with only low-privilege credentials.
Impact
Successful exploitation enables the attacker to obtain password hashes, which can be cracked offline, and API keys that can be used to impersonate legitimate users. This can lead to privilege escalation and full compromise of administrator accounts, potentially allowing complete control over the ProjeQtor instance [2][3].
Mitigation
The vendor released version 12.4.4 to address this issue. Users should upgrade immediately. Additionally, enforce systematic access control on every request and use indirect object references tied to the user session [2].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.