top of page
perceptive_background_267k.jpg

Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, live logging and log history for cronjobs. Prior to version 2.2.0, an authenticat…

Published:

31 maart 2026 om 22:00:00

Alert date:

1 april 2026 om 19:04:16

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Identity & Access

CVE-2026-34072 affects CronMaster, a cronjob management UI application. The vulnerability is an authentication bypass in middleware that allows unauthenticated requests with invalid session cookies to be treated as authenticated when session validation fails. This can lead to unauthorized access to protected pages and execution of privileged Next.js Server Actions. The issue affects versions prior to 2.2.0 and has been patched in version 2.2.0. The vulnerability represents a significant security risk as it allows complete authentication bypass.

Technical details

Mitigation steps:

Affected products:

CronMaster

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page