Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-27591
March 11, 2026
Winter is a free, open-source content management system (CMS) based on the Laravel PHP framework. Prior to 1.0.477, 1.1.12, and 1.2.12, Winter CMS allowed authenticated backend users to escalate their accounts level of access to the system by modifying the roles / permissions assigned to their account through specially crafted requests to the backend while logged in. To actively exploit this security issue, an attacker would need access to the Backend with a user account with any level of access. This vulnerability is fixed in 1.0.477, 1.1.12, and 1.2.12.
Affected Packages
winter/wn-backend-module (PHP):
Affected version(s) >=v1.0.467 <v1.0.477
Fix Suggestion:
Update to version v1.0.477
winter/wn-backend-module (PHP):
Affected version(s) >=v1.2.0 <v1.2.12
Fix Suggestion:
Update to version v1.2.12
winter/wn-backend-module (PHP):
Affected version(s) >=v1.0.467 <v1.1.12
Fix Suggestion:
Update to version v1.1.12
Do you need more information?
Contact Us
CVSS v4
Base Score:
9.4
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
HIGH
Subsequent System Availability
HIGH
CVSS v3
Base Score:
9.9
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Improperly Controlled Modification of Dynamically-Determined Object Attributes
Authorization Bypass Through User-Controlled Key
Improper Access Control
EPSS
Base Score:
0.06