CVE-2026-44987

Published: Mag 09, 2026 Last Modified: Mag 09, 2026
ExploitDB:
Other exploit source:
Google Dorks:
LOW 3,8
Attack Vector: network
Attack Complexity: low
Privileges Required: high
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: low
Availability: none

Description

AI Translation Available

SysReptor is a fully customizable pentest reporting platform. Prior to version 2026.29, users with 'User Admin' permissions can change the email addresses of users with 'Superuser' permissions. If the SysReptor installation has the 'Forgot Password' functionality enabled (non-default), they can reset the Superusers' passwords and authenticate, if the Superuser has no MFA enabled. User managers can then access the Django backend (/admin) or manipulate the settings of the SysReptor installation. Note that user managers have the ability to access all pentest projects by assigning themselves 'Project Admin' permissions. This is intentional and by design. This issue has been patched in version 2026.29.

269

Improper Privilege Management

Draft
Common Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Gain Privileges Or Assume Identity
Applicable Platforms
All platforms may be affected
View CWE Details
https://github.com/Syslifters/sysreptor/releases/tag/2026.29
https://github.com/Syslifters/sysreptor/security/advisories/GHSA-6x8f-v3cf-cvr3