Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/gravitl/netmaker
  4. ›
  5. CVE-2026-29194

CVE-2026-29194: Netmaker has Insufficient Authorization in Host Token Verification

March 9, 2026 (updated March 11, 2026)

The Authorise middleware in Netmaker incorrectly validates host JWT tokens. When a route permits host authentication (hostAllowed=true), a valid host token bypasses all subsequent authorisation checks without verifying that the host is authorised to access the specific requested resource. Any entity possessing knowledge of object identifiers (node IDs, host IDs) can craft a request with an arbitrary valid host token to access, modify, or delete resources belonging to other hosts. Affected endpoints include node info retrieval, host deletion, MQTT signal transmission, fallback host updates, and failover operations.

Credits Artem Danilov (Positive Technologies)

References

  • github.com/advisories/GHSA-hmqr-wjmj-376c
  • github.com/gravitl/netmaker
  • github.com/gravitl/netmaker/releases/tag/v1.5.0
  • github.com/gravitl/netmaker/security/advisories/GHSA-hmqr-wjmj-376c
  • nvd.nist.gov/vuln/detail/CVE-2026-29194

Code Behaviors & Features

Detect and mitigate CVE-2026-29194 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.5.0

Fixed versions

  • 1.5.0

Solution

Upgrade to version 1.5.0 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-863: Incorrect Authorization

Source file

go/github.com/gravitl/netmaker/CVE-2026-29194.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 25 Mar 2026 00:17:04 +0000.