CVE-2026-39962
LDAP injection in MISP ApacheAuthenticate when using a user-controlled Apache environment variable
CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
33th
MISP is an open source threat intelligence and sharing platform. Prior to 2.5.36, improper neutralization of special elements in an LDAP query in ApacheAuthenticate.php allows LDAP injection via an unsanitized username value when ApacheAuthenticate.apacheEnv is configured to use a user-controlled server variable instead of REMOTE_USER (such as in certain proxy setups). An attacker able to control that value can manipulate the LDAP search filter and potentially bypass authentication constraints or cause unauthorized LDAP queries. This vulnerability is fixed in 2.5.36.
| CWE | CWE-90 |
| Vendor | misp |
| Product | misp |
| Published | Apr 9, 2026 |
| Last Updated | Apr 10, 2026 |
Stay Ahead of the Next One
Get instant alerts for misp misp
Be the first to know when new unknown vulnerabilities affecting misp misp are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
MISP / MISP
< 2.5.36
References
github.com: https://github.com/MISP/MISP/security/advisories/GHSA-mc53-48w8-9g63 github.com: https://github.com/MISP/MISP/commit/380ee4136a7d9ce2fe63fce06d517839f30aba10 github.com: https://github.com/MISP/MISP/commit/d7d671ea8f5822e91207dcad2003c35c30092a32 github.com: https://github.com/MISP/MISP/releases/tag/v2.5.36