{"api_version":"1","generated_at":"2026-05-13T07:41:15+00:00","cve":"CVE-2026-44304","urls":{"html":"https://cve.report/CVE-2026-44304","api":"https://cve.report/api/cve/CVE-2026-44304.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-44304","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-44304"},"summary":{"title":"Lemur: LDAP Filter Injection enables post-authentication privilege escalation","description":"Lemur manages TLS certificate creation. Prior to 1.9.0, Lemur's LDAP authentication module (lemur/auth/ldap.py) constructs LDAP search filters using unsanitized user input via Python string interpolation. An authenticated LDAP user can inject LDAP filter metacharacters through the username field to manipulate group membership queries and escalate their privileges to administrator. This vulnerability is fixed in 1.9.0.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-12 22:16:37","updated_at":"2026-05-12 22:16:37"},"problem_types":["CWE-90","CWE-90 CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/Netflix/lemur/security/advisories/GHSA-3r34-vq8m-39gh","name":"https://github.com/Netflix/lemur/security/advisories/GHSA-3r34-vq8m-39gh","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-44304","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-44304","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Netflix","product":"lemur","version":"affected < 1.9.0","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"lemur","vendor":"Netflix","versions":[{"status":"affected","version":"< 1.9.0"}]}],"descriptions":[{"lang":"en","value":"Lemur manages TLS certificate creation. Prior to 1.9.0, Lemur's LDAP authentication module (lemur/auth/ldap.py) constructs LDAP search filters using unsanitized user input via Python string interpolation. An authenticated LDAP user can inject LDAP filter metacharacters through the username field to manipulate group membership queries and escalate their privileges to administrator. This vulnerability is fixed in 1.9.0."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-90","description":"CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-12T21:27:28.118Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/Netflix/lemur/security/advisories/GHSA-3r34-vq8m-39gh","tags":["x_refsource_CONFIRM"],"url":"https://github.com/Netflix/lemur/security/advisories/GHSA-3r34-vq8m-39gh"}],"source":{"advisory":"GHSA-3r34-vq8m-39gh","discovery":"UNKNOWN"},"title":"Lemur: LDAP Filter Injection enables post-authentication privilege escalation"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-44304","datePublished":"2026-05-12T21:27:28.118Z","dateReserved":"2026-05-05T17:39:31.113Z","dateUpdated":"2026-05-12T21:27:28.118Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-12 22:16:37","lastModifiedDate":"2026-05-12 22:16:37","problem_types":["CWE-90","CWE-90 CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"44304","Ordinal":"1","Title":"Lemur: LDAP Filter Injection enables post-authentication privile","CVE":"CVE-2026-44304","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"44304","Ordinal":"1","NoteData":"Lemur manages TLS certificate creation. Prior to 1.9.0, Lemur's LDAP authentication module (lemur/auth/ldap.py) constructs LDAP search filters using unsanitized user input via Python string interpolation. An authenticated LDAP user can inject LDAP filter metacharacters through the username field to manipulate group membership queries and escalate their privileges to administrator. This vulnerability is fixed in 1.9.0.","Type":"Description","Title":"Lemur: LDAP Filter Injection enables post-authentication privile"}]}}}