๐Ÿ” CVE Alert

CVE-2026-41166

HIGH 7.0

OpenRemote has Improper Access Control via updateUserRealmRoles function

CVSS Score
7.0
EPSS Score
0.0%
EPSS Percentile
0th

OpenRemote is an open-source internet-of-things platform. Prior to version 1.22.1, a user who has `write:admin` in one Keycloak realm can call the Manager API to update Keycloak realm roles for users in another realm, including `master`. The handler uses the `{realm}` path segment when talking to the identity provider but does not check that the caller may administer that realm. This could result in a privilege escalation to `master` realm administrator if the attacker controls any user in `master` realm. Version 1.22.1 fixes the issue.

CWE CWE-284
Vendor openremote
Product openremote
Published Apr 22, 2026
Stay Ahead of the Next One

Get instant alerts for openremote openremote

Be the first to know when new high vulnerabilities affecting openremote openremote are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
Low

Affected Versions

openremote / openremote
< 1.22.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openremote/openremote/security/advisories/GHSA-49vv-25qx-mg44 github.com: https://github.com/openremote/openremote/releases/tag/1.22.1