๐Ÿ” CVE Alert

CVE-2026-34406

UNKNOWN 0.0

APTRS: Privilege Escalation via Mass Assignment of is_superuser in User Edit Endpoint

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
27th

APTRS (Automated Penetration Testing Reporting System) is a Python and Django-based automated reporting tool designed for penetration testers and security organizations. Prior to version 2.0.1, the edit_user endpoint (POST /api/auth/edituser/<pk>) allows Any user who can reach that endpoint and submit crafted permission to escalate their own account (or any other account) to superuser by including "is_superuser": true in the request body. The root cause is that CustomUserSerializer explicitly includes is_superuser in its fields list but omits it from read_only_fields, making it a writable field. The edit_user view performs no additional validation to prevent non-superusers from modifying this field. Once is_superuser is set to true, gaining unrestricted access to all application functionality without requiring re-authentication. This issue has been patched in version 2.0.1.

CWE CWE-915
Vendor aptrs
Product aptrs
Published Mar 31, 2026
Last Updated Apr 3, 2026
Stay Ahead of the Next One

Get instant alerts for aptrs aptrs

Be the first to know when new unknown vulnerabilities affecting aptrs aptrs are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

APTRS / APTRS
< 2.0.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/APTRS/APTRS/security/advisories/GHSA-gv25-wp4h-9c35 github.com: https://github.com/APTRS/APTRS/commit/d1f1b3a5d1953082af8e075712ca29742e900d56 github.com: https://github.com/APTRS/APTRS/releases/tag/2.0.1