An insecure direct object reference vulnerability in the Users API component of Crafty Controller allows a remote, authenticated attacker to perform user modification actions via improper API permissions validation.
Advisories
No advisories yet.
Fixes
Solution
Upgrade to version 4.10.3
Workaround
No workaround given by the vendor.
References
History
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arcadia Technology
Arcadia Technology crafty Controller |
|
| Vendors & Products |
Arcadia Technology
Arcadia Technology crafty Controller |
Tue, 21 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An insecure direct object reference vulnerability in the Users API component of Crafty Controller allows a remote, authenticated attacker to perform user modification actions via improper API permissions validation. | |
| Title | Authorization Bypass Through User-Controlled Key in Crafty Controller | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitLab
Published:
Updated: 2026-04-21T17:22:27.276Z
Reserved: 2026-04-06T05:03:53.661Z
Link: CVE-2026-5652
No data.
Status : Received
Published: 2026-04-21T17:16:57.793
Modified: 2026-04-21T18:16:53.633
Link: CVE-2026-5652
No data.
OpenCVE Enrichment
Updated: 2026-04-21T22:45:16Z
Weaknesses