TopVuln

High-risk vulnerability digests

CVE-2026-41166

  • HIGH

Details

CVSS v3
7.0
NVD published
2026-04-22 21:17:09
EPSS
<0.1% probability · 10.6th percentile — 2026-04-24
Affected versions
cpe:2.3:a:openremote:openremote:*:*:*:*:*:*:*:*
Summary
OpenRemote is an open-source internet-of-things platform. Prior to version 1.22.1, a user who has `write:admin` in one Keycloak realm can call the Manager API to update Keycloak realm roles for users in another realm, including `master`. The handler uses the `{realm}` path segment when talking to the identity provider but does not check that the caller may administer that realm. This could result in a privilege escalation to `master` realm administrator if the attacker controls any user in `master` realm. Version 1.22.1 fixes the issue.
Remediation
Not available in our cache.
Exploit info
https://github.com/openremote/openremote/security/advisories/GHSA-49vv-25qx-mg44

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.