Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-14844 | Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, a privilege escalation vulnerability exists in the Joplin server, allowing non-admin users to exploit the API endpoint `PATCH /api/users/:id` to set the `is_admin` field to 1. The vulnerability allows malicious low-privileged users to perform administrative actions without proper authorization. This issue has been patched in version 3.3.3. |
Fri, 16 May 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Joplin Project
Joplin Project joplin |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:* | |
| Vendors & Products |
Joplin Project
Joplin Project joplin |
Wed, 30 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 30 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, a privilege escalation vulnerability exists in the Joplin server, allowing non-admin users to exploit the API endpoint `PATCH /api/users/:id` to set the `is_admin` field to 1. The vulnerability allows malicious low-privileged users to perform administrative actions without proper authorization. This issue has been patched in version 3.3.3. | |
| Title | Privilege escalation in Joplin server via user patch endpoint | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-30T15:11:12.895Z
Reserved: 2025-02-19T16:30:47.774Z
Link: CVE-2025-27134
Updated: 2025-04-30T15:11:00.407Z
Status : Analyzed
Published: 2025-04-30T15:16:00.927
Modified: 2025-05-16T16:32:35.957
Link: CVE-2025-27134
No data.
OpenCVE Enrichment
No data.
EUVD