{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-29196","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-04T14:44:00.715Z","datePublished":"2026-03-07T16:15:08.465Z","dateUpdated":"2026-03-09T18:25:32.679Z"},"containers":{"cna":{"title":"Netmaker: Service User with Network Access Can Access config files with WireGuard Private Keys","problemTypes":[{"descriptions":[{"cweId":"CWE-863","lang":"en","description":"CWE-863: Incorrect Authorization","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":8.7,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/gravitl/netmaker/security/advisories/GHSA-4hgg-c4rr-6h7f","tags":["x_refsource_CONFIRM"],"url":"https://github.com/gravitl/netmaker/security/advisories/GHSA-4hgg-c4rr-6h7f"},{"name":"https://github.com/gravitl/netmaker/releases/tag/v1.5.0","tags":["x_refsource_MISC"],"url":"https://github.com/gravitl/netmaker/releases/tag/v1.5.0"}],"affected":[{"vendor":"gravitl","product":"netmaker","versions":[{"version":"< 1.5.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-07T16:15:08.465Z"},"descriptions":[{"lang":"en","value":"Netmaker makes networks with WireGuard. Prior to version 1.5.0, a user assigned the platform-user role can retrieve WireGuard private keys of all wireguard configs in a network by calling GET /api/extclients/{network} or GET /api/nodes/{network}. While the Netmaker UI restricts visibility, the API endpoints return full records, including private keys, without filtering based on the requesting user's ownership. This issue has been patched in version 1.5.0."}],"source":{"advisory":"GHSA-4hgg-c4rr-6h7f","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-09T17:43:35.082495Z","id":"CVE-2026-29196","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-09T18:25:32.679Z"}}]}}