| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-frf7-jhp9-jxm6 | MantisBT Vulnerable to Privilege Escalation from Manager to Administrator |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 20 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 19 May 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mantisbt
Mantisbt mantisbt |
|
| Vendors & Products |
Mantisbt
Mantisbt mantisbt |
Tue, 19 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mantis Bug Tracker (MantisBT) is an open source issue tracker. Versions 2.28.1 and prior have a Privilege Escalation vulnerability where insufficient access control checks in ProjectUsersAddCommand (manage_proj_user_add.php) allow users having manage_project_threshold access level (manager by default) to grant project-level administrator access to any user (including themselves) in any Project they have manager rights in. The normal project-user add form restricts the selectable access levels to the actor's own project role or below. However, the backend handler still accepts a forged higher access_level value and writes it. The consequences of the privilege escalation are slight, as having administrator access at Project level is effectively not very different from being manager, and it does not actually give administrator privileges on the whole MantisBT instance. In particular, it does not let the upgraded user delete the Project or grant them any access to global administrative functions such as managing Users, Projects, Plugins, Custom Fields, etc. This issue has been fixed in version 2.28.2. | |
| Title | MantisBT: Privilege Escalation from Manager to Administrator | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-20T13:05:47.802Z
Reserved: 2026-03-27T13:45:29.619Z
Link: CVE-2026-34390
Updated: 2026-05-20T13:05:38.225Z
Status : Deferred
Published: 2026-05-19T22:16:37.807
Modified: 2026-05-20T14:06:33.993
Link: CVE-2026-34390
No data.
OpenCVE Enrichment
Updated: 2026-05-20T00:00:16Z
Github GHSA