Vulnerability Description
Cronicle is a multi-server task scheduler and runner, with a web based front-end UI. Prior to 0.9.111, jb child processes can include an update_event key in their JSON output. The server applies this directly to the parent event's stored configuration without any authorization check. A low-privilege user who can create and run events can modify any event property, including webhook URLs and notification emails. This vulnerability is fixed in 0.9.111.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cronicle | Cronicle | < 0.9.111 |
Related Weaknesses (CWE)
References
- https://github.com/jhuckaby/Cronicle/security/advisories/GHSA-5j3v-cq96-xw6vExploitVendor Advisory
- https://github.com/jhuckaby/Cronicle/security/advisories/GHSA-5j3v-cq96-xw6vExploitVendor Advisory
FAQ
What is CVE-2026-39401?
CVE-2026-39401 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Cronicle is a multi-server task scheduler and runner, with a web based front-end UI. Prior to 0.9.111, jb child processes can include an update_event key in their JSON output. The server applies this ...
How severe is CVE-2026-39401?
CVE-2026-39401 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-39401?
Check the references section above for vendor advisories and patch information. Affected products include: Cronicle Cronicle.