Vulnerability Description
A blog.admin v.8.0 and before system's getinfobytoken API interface contains an improper access control which leads to sensitive data exposure. Unauthorized parties can obtain sensitive administrator account information via a valid token, threatening system security.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Anjoy8 | Blog.Admin | 8.0 |
Related Weaknesses (CWE)
References
- http://blagadmin.comBroken Link
- https://gist.github.com/Sw3092567023/c420c6a5ee947d72aeab2b3e0ba92a40ExploitThird Party Advisory
- https://github.com/anjoy8/Blog.CoreProduct
FAQ
What is CVE-2026-30689?
CVE-2026-30689 is a vulnerability with a CVSS score of 7.5 (HIGH). A blog.admin v.8.0 and before system's getinfobytoken API interface contains an improper access control which leads to sensitive data exposure. Unauthorized parties can obtain sensitive administrator ...
How severe is CVE-2026-30689?
CVE-2026-30689 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-30689?
Check the references section above for vendor advisories and patch information. Affected products include: Anjoy8 Blog.Admin.