Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:requarks:wiki.js:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 13 May 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Requarks
Requarks wiki.js |
|
| Vendors & Products |
Requarks
Requarks wiki.js |
Tue, 12 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wiki.js is an open source wiki app built on Node.js. Prior to 2.5.313, the users.update GraphQL mutation accepts an arbitrary groups array and applies it directly to the database with no validation of the group IDs supplied. The resolver passes the caller's arguments straight to the model without any ownership check or restriction on which groups can be assigned. A user with manage:users — a permission typically delegated to wiki moderators for account management — can set groups:[1] on their own account to self-assign to the Administrators group. After re-authentication, the fresh JWT carries manage:system, granting full site administrator access in a single mutation call. This vulnerability is fixed in 2.5.313. | |
| Title | Wiki.js: Privilege Escalation via Missing Group Validation in users.update | |
| Weaknesses | CWE-269 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T14:22:28.495Z
Reserved: 2026-05-05T15:42:40.518Z
Link: CVE-2026-44224
No data.
Status : Analyzed
Published: 2026-05-12T21:16:16.137
Modified: 2026-05-14T14:56:13.470
Link: CVE-2026-44224
No data.
OpenCVE Enrichment
Updated: 2026-05-14T17:00:15Z