


Perceptive Security
SOC/SIEM Consultancy

Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, live logging and log history for cronjobs. Prior to version 2.2.0, an authenticat…
Published:
31 maart 2026 om 22:00:00
Alert date:
1 april 2026 om 19:04:16
Source:
nvd.nist.gov
Web Technologies, Identity & Access
CVE-2026-34072 affects CronMaster, a cronjob management UI application. The vulnerability is an authentication bypass in middleware that allows unauthenticated requests with invalid session cookies to be treated as authenticated when session validation fails. This can lead to unauthorized access to protected pages and execution of privileged Next.js Server Actions. The issue affects versions prior to 2.2.0 and has been patched in version 2.2.0. The vulnerability represents a significant security risk as it allows complete authentication bypass.
Technical details
Mitigation steps:
Affected products:
CronMaster
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-34072
https://github.com/fccview/cronmaster/releases/tag/2.2.0
https://github.com/fccview/cronmaster/security/advisories/GHSA-9whh-mffv-xvh6
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
