{"api_version":"1","generated_at":"2026-05-07T11:16:23+00:00","cve":"CVE-2026-41662","urls":{"html":"https://cve.report/CVE-2026-41662","api":"https://cve.report/api/cve/CVE-2026-41662.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-41662","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-41662"},"summary":{"title":"Admidio: Missing Minimum Administrator Check in Role Membership Removal","description":"Admidio is an open-source user management solution. Prior to version 5.0.9, Role::stopMembership() does not verify whether removing a user from the administrator role leaves zero administrators. The deprecated Membership::stopMembership() contains this safety check, but the current code path bypasses it. Any administrator can remove the last remaining other administrator, locking the entire system out of administrative access. The exploit does not require concurrent requests; sequential removals produce the same result. This issue has been patched in version 5.0.9.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-07 04:16:30","updated_at":"2026-05-07 04:16:30"},"problem_types":["CWE-754","CWE-754 CWE-754: Improper Check for Unusual or Exceptional Conditions"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"5.2","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H","baseScore":5.2,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"5.2","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":5.2,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H","version":"3.1"}}],"references":[{"url":"https://github.com/Admidio/admidio/releases/tag/v5.0.9","name":"https://github.com/Admidio/admidio/releases/tag/v5.0.9","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/Admidio/admidio/security/advisories/GHSA-c7xm-r6vj-8vg6","name":"https://github.com/Admidio/admidio/security/advisories/GHSA-c7xm-r6vj-8vg6","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-41662","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-41662","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Admidio","product":"admidio","version":"affected < 5.0.9","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"admidio","vendor":"Admidio","versions":[{"status":"affected","version":"< 5.0.9"}]}],"descriptions":[{"lang":"en","value":"Admidio is an open-source user management solution. Prior to version 5.0.9, Role::stopMembership() does not verify whether removing a user from the administrator role leaves zero administrators. The deprecated Membership::stopMembership() contains this safety check, but the current code path bypasses it. Any administrator can remove the last remaining other administrator, locking the entire system out of administrative access. The exploit does not require concurrent requests; sequential removals produce the same result. This issue has been patched in version 5.0.9."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":5.2,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-754","description":"CWE-754: Improper Check for Unusual or Exceptional Conditions","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-07T02:59:50.508Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/Admidio/admidio/security/advisories/GHSA-c7xm-r6vj-8vg6","tags":["x_refsource_CONFIRM"],"url":"https://github.com/Admidio/admidio/security/advisories/GHSA-c7xm-r6vj-8vg6"},{"name":"https://github.com/Admidio/admidio/releases/tag/v5.0.9","tags":["x_refsource_MISC"],"url":"https://github.com/Admidio/admidio/releases/tag/v5.0.9"}],"source":{"advisory":"GHSA-c7xm-r6vj-8vg6","discovery":"UNKNOWN"},"title":"Admidio: Missing Minimum Administrator Check in Role Membership Removal"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-41662","datePublished":"2026-05-07T02:59:50.508Z","dateReserved":"2026-04-21T23:58:43.803Z","dateUpdated":"2026-05-07T02:59:50.508Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-07 04:16:30","lastModifiedDate":"2026-05-07 04:16:30","problem_types":["CWE-754","CWE-754 CWE-754: Improper Check for Unusual or Exceptional Conditions"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H","baseScore":5.2,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":4.2}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"41662","Ordinal":"1","Title":"Admidio: Missing Minimum Administrator Check in Role Membership ","CVE":"CVE-2026-41662","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"41662","Ordinal":"1","NoteData":"Admidio is an open-source user management solution. Prior to version 5.0.9, Role::stopMembership() does not verify whether removing a user from the administrator role leaves zero administrators. The deprecated Membership::stopMembership() contains this safety check, but the current code path bypasses it. Any administrator can remove the last remaining other administrator, locking the entire system out of administrative access. The exploit does not require concurrent requests; sequential removals produce the same result. This issue has been patched in version 5.0.9.","Type":"Description","Title":"Admidio: Missing Minimum Administrator Check in Role Membership "}]}}}