Description
Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, live logging and log history for cronjobs. Prior to version 2.2.0, an authentication bypass in middleware allows unauthenticated requests with an invalid session cookie to be treated as authenticated when the middleware’s session-validation fetch fails. This can result in unauthorized access to protected pages and unauthorized execution of privileged Next.js Server Actions. This issue has been patched in version 2.2.0.
INFO
Published Date :
2026-04-01T16:51:33.306Z
Last Modified :
2026-04-01T17:45:11.248Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-34072 vulnerability.
| Vendors | Products |
|---|---|
| Fccview |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-34072.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact