Cyber Posture

CVE-2026-42562

High

Published: 09 May 2026

Published
09 May 2026
Modified
09 May 2026
KEV Added
Patch
CVSS Score 8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
EPSS Score 0.0004 11.2th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-42562 is a high-severity Improper Privilege Management (CWE-269) vulnerability. Its CVSS base score is 8.3 (High).

Operationally, ranked at the 11.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-269

Policy addresses roles, responsibilities, and privilege management to prevent improper privilege assignments.

addresses: CWE-269

Access supervision ensures privileges are assigned and managed without improper escalation or retention.

addresses: CWE-269

Assigning group/role memberships and access authorizations (privileges) while reviewing accounts addresses improper privilege management.

addresses: CWE-269

Enforces proper privilege management by requiring all decisions through the verified reference monitor.

addresses: CWE-269

By mandating division of duties across roles, the control enforces proper privilege management and prevents a single entity from controlling an entire sensitive process.

addresses: CWE-269

Implements core proper privilege management by restricting to only required rights.

addresses: CWE-269

Policy requires training on privilege management and least privilege, making it harder to exploit improper privilege management weaknesses.

addresses: CWE-269

Training covers proper privilege management practices, making incorrect privilege assignments less likely.

NVD Description

Plainpad is a self hosted note taking app. Prior to version 1.1.1, Plainpad allows a low-privilege authenticated user to self-escalate to administrator by submitting admin=true in PUT /api.php/v1/users/{id}. The endpoint directly persists the admin attribute from user input, and the…

more

escalated account can immediately access admin-only routes. This issue has been patched in version 1.1.1.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

CVEs Like This One

CVE-2026-2777Shared CWE-269
CVE-2025-0834Shared CWE-269
CVE-2025-48613Shared CWE-269
CVE-2024-58104Shared CWE-269
CVE-2025-15027Shared CWE-269
CVE-2026-35595Shared CWE-269
CVE-2025-64487Shared CWE-269
CVE-2025-0180Shared CWE-269
CVE-2026-5144Shared CWE-269
CVE-2025-67905Shared CWE-269

References