Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2026-34579— MantisBT has an authorization bypass via private issue monitoring

AI Predicted 7.5 Difficulty: Easy EPSS 0.04% · P11

Affected Version Matrix 1

VendorProductVersion RangeStatus
mantisbtmantisbt< 2.28.2affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-34579

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
MantisBT has an authorization bypass via private issue monitoring
Source: NVD (National Vulnerability Database)
Vulnerability Description
Mantis Bug Tracker (MantisBT) is an open source issue tracker. Versions 2.28.1 and prior are vulnerable to Authorization Bypass through the private issue monitoring feature . Using a crafted POST request to bug_monitor_add.php, a user with project-level access can add themselves as a monitor for a private issue they do not have access to. Despite displaying an Access Denied error, the application accepts the request and creates a monitor relationship for the private issue. Direct access to the private issue remains blocked, but the user will receive email notifications for updates, leading to disclosure of the private issue's metadata and content. This issue has been fixed in version 2.28.2.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制不正确
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mantis Bug Tracker 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mantis Bug Tracker(MantisBT)是Mantis Bug Tracker开源的一个 bug 跟踪器。 Mantis Bug Tracker 2.28.1及之前版本存在信息泄露漏洞,该漏洞源于通过私有问题监控功能,使用特制的POST请求到bug_monitor_add.php,具有项目级访问权限的用户可以添加自己为无权访问的私有问题的监控者,可能导致授权绕过。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
mantisbtmantisbt < 2.28.2 -

II. Public POCs for CVE-2026-34579

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-34579

登录查看更多情报信息。
Patch · 2Advisory · 1

Same Patch Batch · mantisbt · 2026-05-19 · 7 CVEs total

CVE-2026-347544.3 MEDIUMMantisBT allows unauthorized users to upload attachments to restricted issues via REST API
CVE-2026-33052MantisBT: Authorization Bypass in Global Profile Creation
CVE-2026-34744MantisBT authorization bypass allows continued access to self-uploaded attachments on priv
CVE-2026-34463MantisBT has Stored HTML Injection/XSS via Clone Issue Form
CVE-2026-34390MantisBT: Privilege Escalation from Manager to Administrator
CVE-2026-34970MantisBT Bugnote Revision Page Leaks Private Issue Metadata After Issue Access Is Revoked

IV. Related Vulnerabilities

V. Comments for CVE-2026-34579

No comments yet


Leave a comment