| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-49vv-25qx-mg44 | OpenRemote has Improper Access Control via updateUserRealmRoles function |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 23 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openremote
Openremote openremote |
|
| Vendors & Products |
Openremote
Openremote openremote |
Wed, 22 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenRemote is an open-source internet-of-things platform. Prior to version 1.22.1, a user who has `write:admin` in one Keycloak realm can call the Manager API to update Keycloak realm roles for users in another realm, including `master`. The handler uses the `{realm}` path segment when talking to the identity provider but does not check that the caller may administer that realm. This could result in a privilege escalation to `master` realm administrator if the attacker controls any user in `master` realm. Version 1.22.1 fixes the issue. | |
| Title | OpenRemote has Improper Access Control via updateUserRealmRoles function | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-23T12:55:20.758Z
Reserved: 2026-04-17T16:34:45.525Z
Link: CVE-2026-41166
Updated: 2026-04-23T12:55:10.059Z
Status : Awaiting Analysis
Published: 2026-04-22T21:17:09.167
Modified: 2026-04-23T13:16:12.343
Link: CVE-2026-41166
No data.
OpenCVE Enrichment
Updated: 2026-04-22T21:30:27Z
Github GHSA