{"api_version":"1","generated_at":"2026-04-22T21:27:41+00:00","cve":"CVE-2026-31836","urls":{"html":"https://cve.report/CVE-2026-31836","api":"https://cve.report/api/cve/CVE-2026-31836.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-31836","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-31836"},"summary":{"title":"Mass Assignment Privilege Escalation in Checkmate","description":"Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations. In versions from 3.5.1 and prior, a mass assignment vulnerability in Checkmate's user profile update endpoint allows any authenticated user to escalate their privileges to superadmin, bypassing all role-based access controls. An attacker can modify their user role to gain complete administrative access to the application, including the ability to view all users, modify critical configurations, and access sensitive system data. At time of publication, there are no publicly available patches.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-03-20 18:16:13","updated_at":"2026-03-30 14:35:01"},"problem_types":["CWE-269","CWE-285","CWE-285 CWE-285: Improper Authorization","CWE-269 CWE-269: Improper Privilege Management"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/bluewave-labs/Checkmate/security/advisories/GHSA-6368-x7wr-wpm2","name":"https://github.com/bluewave-labs/Checkmate/security/advisories/GHSA-6368-x7wr-wpm2","refsource":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-31836","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31836","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"bluewave-labs","product":"Checkmate","version":"affected <= 3.5.1","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"31836","vulnerable":"1","versionEndIncluding":"3.5.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"bluewavelabs","cpe5":"checkmate","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"31836","cve":"CVE-2026-31836","epss":"0.000330000","percentile":"0.096150000","score_date":"2026-04-03","updated_at":"2026-04-04 00:05:44"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-31836","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-03-20T21:27:07.529949Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-20T21:27:29.683Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"Checkmate","vendor":"bluewave-labs","versions":[{"status":"affected","version":"<= 3.5.1"}]}],"descriptions":[{"lang":"en","value":"Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations. In versions from 3.5.1 and prior, a mass assignment vulnerability in Checkmate's user profile update endpoint allows any authenticated user to escalate their privileges to superadmin, bypassing all role-based access controls. An attacker can modify their user role to gain complete administrative access to the application, including the ability to view all users, modify critical configurations, and access sensitive system data. At time of publication, there are no publicly available patches."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-285","description":"CWE-285: Improper Authorization","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-269","description":"CWE-269: Improper Privilege Management","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-20T17:50:12.545Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/bluewave-labs/Checkmate/security/advisories/GHSA-6368-x7wr-wpm2","tags":["x_refsource_CONFIRM"],"url":"https://github.com/bluewave-labs/Checkmate/security/advisories/GHSA-6368-x7wr-wpm2"}],"source":{"advisory":"GHSA-6368-x7wr-wpm2","discovery":"UNKNOWN"},"title":"Mass Assignment Privilege Escalation in Checkmate"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-31836","datePublished":"2026-03-20T17:50:12.545Z","dateReserved":"2026-03-09T17:41:56.078Z","dateUpdated":"2026-03-20T21:27:29.683Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-20 18:16:13","lastModifiedDate":"2026-03-30 14:35:01","problem_types":["CWE-269","CWE-285","CWE-285 CWE-285: Improper Authorization","CWE-269 CWE-269: Improper Privilege Management"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bluewavelabs:checkmate:*:*:*:*:*:*:*:*","versionEndIncluding":"3.5.1","matchCriteriaId":"D7F58CAA-914A-4C3B-8E92-E137225D9620"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"31836","Ordinal":"1","Title":"Mass Assignment Privilege Escalation in Checkmate","CVE":"CVE-2026-31836","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"31836","Ordinal":"1","NoteData":"Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations. In versions from 3.5.1 and prior, a mass assignment vulnerability in Checkmate's user profile update endpoint allows any authenticated user to escalate their privileges to superadmin, bypassing all role-based access controls. An attacker can modify their user role to gain complete administrative access to the application, including the ability to view all users, modify critical configurations, and access sensitive system data. At time of publication, there are no publicly available patches.","Type":"Description","Title":"Mass Assignment Privilege Escalation in Checkmate"}]}}}