{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T23:08:01.460","vulnerabilities":[{"cve":{"id":"CVE-2026-28790","sourceIdentifier":"security-advisories@github.com","published":"2026-03-05T20:16:16.820","lastModified":"2026-03-10T15:29:58.073","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.0, OliveTin allows an unauthenticated guest to terminate running actions through KillAction even when authRequireGuestsToLogin: true is enabled. Guests are correctly blocked from dashboard access, but can still call the KillAction RPC directly and successfully stop a running action. This is a broken access control issue that causes unauthorized denial of service against legitimate action executions. This issue has been patched in version 3000.11.0."},{"lang":"es","value":"OliveTin da acceso a comandos de shell predefinidos desde una interfaz web. Antes de la versión 3000.11.0, OliveTin permite a un invitado no autenticado terminar acciones en ejecución a través de KillAction incluso cuando authRequireGuestsToLogin: true está habilitado. Los invitados son bloqueados correctamente del acceso al panel de control, pero aún pueden llamar al RPC de KillAction directamente y detener con éxito una acción en ejecución. Esto es un problema de control de acceso roto que causa denegación de servicio no autorizada contra ejecuciones de acciones legítimas. Este problema ha sido parcheado en la versión 3000.11.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-284"},{"lang":"en","value":"CWE-862"},{"lang":"en","value":"CWE-863"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:olivetin:olivetin:*:*:*:*:*:*:*:*","versionEndExcluding":"3000.11.0","matchCriteriaId":"AA9FC7F5-7327-4784-A1FF-10E968680C81"}]}]}],"references":[{"url":"https://github.com/OliveTin/OliveTin/commit/d9804182eae43cf49f735e6533ddbe1541c2b9a9","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/OliveTin/OliveTin/releases/tag/3000.11.0","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/OliveTin/OliveTin/security/advisories/GHSA-4fqm-6fmh-82mq","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/OliveTin/OliveTin/security/advisories/GHSA-4fqm-6fmh-82mq","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}