Openplc V3

3 CVEs product

Monthly

CVE-2026-35063 HIGH This Week

Authorization bypass in OpenPLC_V3 REST API allows authenticated low-privilege users to delete administrator accounts or create new admin-level accounts. The API validates JWT token presence but fails to enforce role-based access control, enabling any user with basic authentication to escalate privileges to full administrator access or remove existing administrators by manipulating user ID parameters. This affects all versions of OpenPLC_V3. No public exploit identified at time of analysis.

Authentication Bypass Openplc V3
NVD
CVSS 4.0
8.7
EPSS
0.0%
CVE-2026-35556 CRITICAL Act Now

Plaintext credential storage in OpenPLC_V3 enables network-based attackers to retrieve authentication credentials without requiring prior authentication or user interaction, leading to complete system compromise. The CVSS v4.0 score of 9.2 reflects critical-severity risk from network-accessible credential exposure affecting confidentiality and integrity across all OpenPLC_V3 deployments. No public exploit identified at time of analysis.

Information Disclosure Openplc V3
NVD
CVSS 4.0
9.2
EPSS
0.0%
CVE-2026-28205 CRITICAL Act Now

Authentication bypass in OpenPLC_V3 allows unauthenticated remote attackers to gain unauthorized system access through insecurely configured API endpoints. The vulnerability stems from insecure default resource initialization (CWE-1188), enabling complete circumvention of authentication mechanisms. Attackers can exploit this over the network with low attack complexity to achieve high confidentiality, integrity, and availability impact across vulnerable and subsequent systems. No public exploit identified at time of analysis.

Authentication Bypass Openplc V3
NVD
CVSS 4.0
9.2
EPSS
0.1%
CVE-2026-35063
EPSS 0% CVSS 8.7
HIGH This Week

Authorization bypass in OpenPLC_V3 REST API allows authenticated low-privilege users to delete administrator accounts or create new admin-level accounts. The API validates JWT token presence but fails to enforce role-based access control, enabling any user with basic authentication to escalate privileges to full administrator access or remove existing administrators by manipulating user ID parameters. This affects all versions of OpenPLC_V3. No public exploit identified at time of analysis.

Authentication Bypass Openplc V3
NVD
CVE-2026-35556
EPSS 0% CVSS 9.2
CRITICAL Act Now

Plaintext credential storage in OpenPLC_V3 enables network-based attackers to retrieve authentication credentials without requiring prior authentication or user interaction, leading to complete system compromise. The CVSS v4.0 score of 9.2 reflects critical-severity risk from network-accessible credential exposure affecting confidentiality and integrity across all OpenPLC_V3 deployments. No public exploit identified at time of analysis.

Information Disclosure Openplc V3
NVD
CVE-2026-28205
EPSS 0% CVSS 9.2
CRITICAL Act Now

Authentication bypass in OpenPLC_V3 allows unauthenticated remote attackers to gain unauthorized system access through insecurely configured API endpoints. The vulnerability stems from insecure default resource initialization (CWE-1188), enabling complete circumvention of authentication mechanisms. Attackers can exploit this over the network with low attack complexity to achieve high confidentiality, integrity, and availability impact across vulnerable and subsequent systems. No public exploit identified at time of analysis.

Authentication Bypass Openplc V3
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy