CVE-2026-34203: Nautobot: Management of users via REST API does not apply configured password validators
In Nautobot versions prior to 2.4.30 or prior to 3.0.10, user creation and editing via the REST API fails to apply the password validation rules defined by Django’s AUTH_PASSWORD_VALIDATORS setting (which defaults to an empty list, i.e., no specific rules, but can be configured in Nautobot’s nautobot_config.py to apply various rules if desired). This can potentially allow for the creation or modification of users to have passwords that are weak or otherwise do not comply with configured standards.
Management of users via the Nautobot admin UI does correctly enforce configured password validation at this time.
References
- github.com/advisories/GHSA-xmpv-j7p2-j873
- github.com/nautobot/nautobot
- github.com/nautobot/nautobot/commit/589f7caf54124ad76bc9fcbb7bdcaa25627cd598
- github.com/nautobot/nautobot/commit/d1ef3135aa02fa07de061e8c085f8cce425fe8c9
- github.com/nautobot/nautobot/pull/8778
- github.com/nautobot/nautobot/pull/8779
- github.com/nautobot/nautobot/security/advisories/GHSA-xmpv-j7p2-j873
- nvd.nist.gov/vuln/detail/CVE-2026-34203
Code Behaviors & Features
Detect and mitigate CVE-2026-34203 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →