Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42300— DevGuard: Unauthenticated identity assertion via `X-Admin-Token` header

AI Predicted 8.1 Difficulty: Easy EPSS 0.05% · P16

Affected Version Matrix 1

VendorProductVersion RangeStatus
l3montree-devdevguard< 1.2.2affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42300

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
DevGuard: Unauthenticated identity assertion via `X-Admin-Token` header
Source: NVD (National Vulnerability Database)
Vulnerability Description
DevGuard provides vulnerability management for the full software supply chain. Prior to 1.2.2, the SessionMiddleware accepts a client-supplied X-Admin-Token HTTP request header and uses its raw string value as the authenticated userID when no Kratos session cookie is present. An unauthenticated attacker who knows or can guess a target user's Kratos identity UUID can issue requests as that user. Where the target user is an organisation admin or owner, this gives the attacker full control over that organisation's DevGuard resources. This vulnerability is fixed in 1.2.2.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用候选路径或通道进行的认证绕过
Source: NVD (National Vulnerability Database)
Vulnerability Title
devguard 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
devguard是L3montree开源的一款软件供应链漏洞管理平台。 devguard 1.2.2之前版本存在安全漏洞,该漏洞源于SessionMiddleware接受客户端提供的X-Admin-Token HTTP请求头,并在没有Kratos会话cookie时将其原始字符串值用作经过身份验证的用户ID,可能导致未经身份验证的攻击者知道或猜测目标用户的Kratos身份UUID后以该用户身份发出请求,若目标用户为组织管理员或所有者,则攻击者可完全控制该组织的DevGuard资源。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
l3montree-devdevguard < 1.2.2 -

II. Public POCs for CVE-2026-42300

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42300

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-42300

No comments yet


Leave a comment