๐Ÿ” CVE Alert

CVE-2026-29194

UNKNOWN 0.0

Netmaker: Insufficient Authorization in Host Token Verification

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Netmaker makes networks with WireGuard. Prior to version 1.5.0, the Authorize middleware in Netmaker incorrectly validates host JWT tokens. When a route permits host authentication (hostAllowed=true), a valid host token bypasses all subsequent authorization checks without verifying that the host is authorized to access the specific requested resource. Any entity possessing knowledge of object identifiers (node IDs, host IDs) can craft a request with an arbitrary valid host token to access, modify, or delete resources belonging to other hosts. Affected endpoints include node info retrieval, host deletion, MQTT signal transmission, fallback host updates, and failover operations. This issue has been patched in version 1.5.0.

CWE CWE-863
Vendor gravitl
Product netmaker
Published Mar 7, 2026
Last Updated Mar 9, 2026
Stay Ahead of the Next One

Get instant alerts for gravitl netmaker

Be the first to know when new unknown vulnerabilities affecting gravitl netmaker are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

gravitl / netmaker
< 1.5.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/gravitl/netmaker/security/advisories/GHSA-hmqr-wjmj-376c github.com: https://github.com/gravitl/netmaker/releases/tag/v1.5.0