GCVE-1-2026-0018

Vulnerability from gna-1 – Published: 2026-02-27 13:25 – Updated: 2026-02-27 13:25
VLAI?
Title
Improper access control in MISP user contact form allows cross-organisation email targeting
Summary
A flaw in the admin_email() action allowed a non–site-admin user to submit the contact/email form in a way that bypassed intended organisation restrictions. The server-side logic did not sufficiently verify that the recipient organisation provided in the request was one the user was authorized to target. As a result, an authenticated user could potentially send emails to users outside their own organisation by manipulating the recipient organisation selection (e.g., by tampering with request parameters).
CWE
Assigner
Impacted products
Vendor Product Version
misp misp Affected: ≤ 2.5.
Create a notification for this product.
Credits
Maxime ESCOURBIAC from Michelin CERT Sami Mokaddem (aka Graphman)

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "misp",
          "vendor": "misp",
          "versions": [
            {
              "lessThanOrEqual": "2.5.",
              "status": "affected"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Maxime ESCOURBIAC from Michelin CERT"
        },
        {
          "lang": "en",
          "type": "remediation developer",
          "value": "Sami Mokaddem"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A flaw in the \u003ccode\u003eadmin_email()\u003c/code\u003e action allowed a non\u2013site-admin user to submit the contact/email form in a way that bypassed intended organisation restrictions. The server-side logic did not sufficiently verify that the recipient organisation provided in the request was one the user was authorized to target. As a result, an authenticated user could potentially send emails to users outside their own organisation by manipulating the recipient organisation selection (e.g., by tampering with request parameters)."
            }
          ],
          "value": "A flaw in the admin_email() action allowed a non\u2013site-admin user to submit the contact/email form in a way that bypassed intended organisation restrictions. The server-side logic did not sufficiently verify that the recipient organisation provided in the request was one the user was authorized to target. As a result, an authenticated user could potentially send emails to users outside their own organisation by manipulating the recipient organisation selection (e.g., by tampering with request parameters)."
        }
      ],
      "impacts": [
        {
          "descriptions": [
            {
              "lang": "en"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "orgId": "00000000-0000-4000-9000-000000000000"
      },
      "references": [
        {
          "url": "https://github.com/MISP/MISP/commit/c7c11678dcb4f7040d3dab1f7af6b011fc3fd568"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Improper access control in MISP user contact form allows cross-organisation email targeting",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "00000000-0000-4000-9000-000000000000",
    "datePublished": "2026-02-27T13:25:32.632362Z",
    "dateUpdated": "2026-02-27T13:25:32.632362Z",
    "requesterUserId": "00000000-0000-4000-9000-000000000000",
    "serial": 1,
    "state": "PUBLISHED",
    "vulnId": "GCVE-1-2026-0018",
    "vulnerabilitylookup_history": [
      [
        "alexandre.dulaunoy@circl.lu",
        "2026-02-27T13:25:32.632362Z"
      ]
    ]
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…