Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. 9router
  4. ›
  5. CVE-2026-5842

CVE-2026-5842: decolua 9router vulnerable to authorization bypass

April 9, 2026 (updated April 10, 2026)

A security vulnerability has been detected in decolua 9router up to 0.3.47. The impacted element is an unknown function of the file /api of the component Administrative API Endpoint. The manipulation leads to authorization bypass. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 0.3.75 is sufficient to resolve this issue. It is suggested to upgrade the affected component.

References

  • github.com/advisories/GHSA-xrrh-p7f2-27vm
  • github.com/decolua/9router
  • github.com/decolua/9router/issues/431
  • github.com/decolua/9router/issues/431
  • github.com/decolua/9router/releases/tag/v0.3.75
  • github.com/deepcat1337/Free_Api_Exploit/tree/main
  • nvd.nist.gov/vuln/detail/CVE-2026-5842
  • vuldb.com/submit/790003
  • vuldb.com/vuln/356298
  • vuldb.com/vuln/356298/cti

Code Behaviors & Features

Detect and mitigate CVE-2026-5842 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.3.75

Fixed versions

  • 0.3.75

Solution

Upgrade to version 0.3.75 or above.

Impact 7.3 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-285: Improper Authorization

Source file

npm/9router/CVE-2026-5842.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:20:24 +0000.