CVE-2026-34203
LOW
2,7
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: high
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: none
Description
AI Translation Available
Nautobot is a Network Source of Truth and Network Automation Platform. Prior to versions 2.4.30 and 3.0.10, user creation and editing via the REST API fails to apply the password validation rules defined by Django's AUTH_PASSWORD_VALIDATORS setting (which defaults to an empty list, i.e., no specific rules, but can be configured in Nautobot's nautobot_config.py to apply various rules if desired). This can potentially allow for the creation or modification of users to have passwords that are weak or otherwise do not comply with configured standards. This issue has been patched in versions 2.4.30 and 3.0.10.
521
Weak Password Requirements
DraftCommon Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Gain Privileges Or Assume Identity
Applicable Platforms
All platforms may be affected
https://github.com/nautobot/nautobot/commit/589f7caf54124ad76bc9fcbb7bdcaa25627…
https://github.com/nautobot/nautobot/commit/d1ef3135aa02fa07de061e8c085f8cce425…
https://github.com/nautobot/nautobot/pull/8778
https://github.com/nautobot/nautobot/pull/8779
https://github.com/nautobot/nautobot/security/advisories/GHSA-xmpv-j7p2-j873