CVE-2026-39401

MEDIUM

Privilege Escalation via update_event Job Output in Cronicle

Title source: cna
STIX 2.1

Description

Cronicle is a multi-server task scheduler and runner, with a web based front-end UI. Prior to 0.9.111, jb child processes can include an update_event key in their JSON output. The server applies this directly to the parent event's stored configuration without any authorization check. A low-privilege user who can create and run events can modify any event property, including webhook URLs and notification emails. This vulnerability is fixed in 0.9.111.

Scores

CVSS v3 5.4
EPSS 0.0003
EPSS Percentile 8.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-862
Status published
Products (2)
cronicle/cronicle < 0.9.111
jhuckaby/Cronicle < 0.9.111
Published Apr 07, 2026
Tracked Since Apr 08, 2026