CVE-2026-3185 - Vulnerability Analysis
MediumCVSS: 5.3Last Updated: February 26, 2026
feiyuchuixue sz-boot-parent - Authorization Bypass
Published: February 25, 2026Updated: February 26, 2026PoC AvailableRemote Exploitable
Overview
feiyuchuixue sz-boot-parent <= 1.3.2-beta contains an authorization bypass caused by improper message ownership verification in /api/admin/sys-message/, letting remote attackers bypass authorization, exploit requires no special privileges.
Severity & Score
Severity: Medium
CVSS Score: 5.3
Impact
Remote attackers can bypass authorization to access or manipulate messages not belonging to them.
Mitigation
Upgrade to version 1.3.3-beta.
References
- https://vuldb.com/?submit.754036
- https://github.com/feiyuchuixue/sz-boot-parent/
- https://github.com/feiyuchuixue/sz-boot-parent/commit/aefaabfd7527188bfba3c8c9eee17c316d094802
- https://github.com/feiyuchuixue/sz-boot-parent/releases/tag/v1.3.3-beta
- https://github.com/yuccun/CVE/blob/main/sz-boot-parent-IDOR_Message_ID_Enumeration.md
- https://vuldb.com/?ctiid.347743
- https://vuldb.com/?id.347743
Related Resources
Details
- CVE ID
- CVE-2026-3185
- Severity
- Medium
- CVSS Score
- 5.3
- Type
- broken_access_control
- Status
- confirmed
CWE
- CWE-285
- CWE-639
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N