Cyber Posture

CVE-2026-42205

High

Published: 08 May 2026

Published
08 May 2026
Modified
08 May 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 11.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-42205 is a high-severity Improper Access Control (CWE-284) vulnerability. Its CVSS base score is 8.8 (High).

Operationally, ranked at the 11.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-284 CWE-639

Ensuring access control decisions are made and applied to every request before enforcement directly prevents improper access control by requiring policy-based checks.

addresses: CWE-284 CWE-639

Enforcing approved authorizations directly implements access control policies to block unauthorized access.

addresses: CWE-284

The access control policy and procedures directly mandate and enforce proper access control mechanisms across the organization.

addresses: CWE-284

Device lock enforces restricted access until re-authentication, directly reducing unauthorized use of active sessions.

addresses: CWE-284

Supervision and review of access control activities directly detects and remediates improper access configurations or usages.

addresses: CWE-284

Explicitly identifying and documenting actions permitted without identification or authentication enforces proper access control boundaries by defining justified exceptions.

addresses: CWE-284

By automatically labeling outputs with security attributes, the control supports attribute-based enforcement and reduces exploitability of improper access control weaknesses.

addresses: CWE-284

Associating and retaining security attributes with data directly supports enforcement of access control decisions across storage, processing, and transmission.

NVD Description

Avo is a framework to create admin panels for Ruby on Rails apps. Prior to version 3.31.2, a broken access control vulnerability was identified in the ActionsController of the Avo framework. Due to insecure action lookup logic, an authenticated user…

more

can execute any Action class (descendants of Avo::BaseAction) on any resource, even if the action is not registered for that specific resource. This leads to Privilege Escalation and unauthorized data manipulation across the entire application. This issue has been patched in version 3.31.2.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

CVEs Like This One

CVE-2026-25758Shared CWE-284, CWE-639
CVE-2025-62166Shared CWE-284, CWE-639
CVE-2026-34444Shared CWE-284, CWE-639
CVE-2026-21447Shared CWE-284, CWE-639
CVE-2025-64516Shared CWE-284, CWE-639
CVE-2026-20897Shared CWE-284, CWE-639
CVE-2026-39942Shared CWE-284, CWE-639
CVE-2026-20912Shared CWE-284, CWE-639
CVE-2026-27449Shared CWE-284, CWE-639
CVE-2026-27591Shared CWE-284, CWE-639

References