← Zuruck zu CVEs
CVE-2026-39401
MEDIUM5.4
Beschreibung
Cronicle is a multi-server task scheduler and runner, with a web based front-end UI. Prior to 0.9.111, jb child processes can include an update_event key in their JSON output. The server applies this directly to the parent event's stored configuration without any authorization check. A low-privilege user who can create and run events can modify any event property, including webhook URLs and notification emails. This vulnerability is fixed in 0.9.111.
CVE Details
CVSS v3.1 Bewertung5.4
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht4/7/2026
Zuletzt geandert4/15/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
cronicle:cronicle
Schwachen (CWE)
CWE-862
Referenzen
https://github.com/jhuckaby/Cronicle/security/advisories/GHSA-5j3v-cq96-xw6v(security-advisories@github.com)
https://github.com/jhuckaby/Cronicle/security/advisories/GHSA-5j3v-cq96-xw6v(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.