๐Ÿ” CVE Alert

CVE-2026-35063

UNKNOWN 0.0

Missing Authorization in OpenPLC_V3

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
12th

OpenPLC_V3 REST API endpoint checks for JWT presence but never verifies the caller's role. Any authenticated user with role=user can delete any other user, including administrators, by specifying their user ID or they can create new accounts with role=admin, escalating to full administrator access.

CWE CWE-862
Vendor openplc_v3
Product openplc_v3
Published Apr 9, 2026
Last Updated Apr 10, 2026
Stay Ahead of the Next One

Get instant alerts for openplc_v3 openplc_v3

Be the first to know when new unknown vulnerabilities affecting openplc_v3 openplc_v3 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

OpenPLC_V3 / OpenPLC_V3
All versions

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
cisa.gov: https://www.cisa.gov/news-events/ics-advisories/icsa-25-345-10

Credits

Arad Inbar, Nir Somech, Ben Grinberg, Daniel Lubel, Erez Cohen, and Adiel Sol from DREAM