Description
An insecure direct object reference vulnerability in the Users API component of Crafty Controller allows a remote, authenticated attacker to perform user modification actions via improper API permissions validation.
Published:
2026-04-21
Score:
9 Critical
EPSS:
< 1% Very Low
KEV:
No
Impact:
Unauthorized user modification via direct object reference
Action:
Apply Patch
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Solution
Upgrade to version 4.10.3
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Mon, 27 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Craftycontrol
Craftycontrol crafty Controller |
|
| CPEs | cpe:2.3:a:craftycontrol:crafty_controller:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Craftycontrol
Craftycontrol crafty Controller |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arcadia Technology
Arcadia Technology crafty Controller |
|
| Vendors & Products |
Arcadia Technology
Arcadia Technology crafty Controller |
Tue, 21 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An insecure direct object reference vulnerability in the Users API component of Crafty Controller allows a remote, authenticated attacker to perform user modification actions via improper API permissions validation. | |
| Title | Authorization Bypass Through User-Controlled Key in Crafty Controller | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitLab
Published:
Updated: 2026-04-21T17:22:27.276Z
Reserved: 2026-04-06T05:03:53.661Z
Link: CVE-2026-5652
No data.
Status : Analyzed
Published: 2026-04-21T17:16:57.793
Modified: 2026-04-27T19:47:08.807
Link: CVE-2026-5652
No data.
OpenCVE Enrichment
Updated: 2026-04-21T22:45:16Z
Weaknesses