M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update endpoint with a crafted payload to grant administrative access to a standard user account.

Project Subscriptions

Vendors Products
Tildeslash Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 03 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Tildeslash m\/monit
CPEs cpe:2.3:a:tildeslash:m\/monit:3.7.4:*:*:*:*:*:*:*
Vendors & Products Tildeslash m\/monit

Thu, 29 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tildeslash
Tildeslash monit
Vendors & Products Tildeslash
Tildeslash monit

Wed, 28 Jan 2026 17:45:00 +0000

Type Values Removed Values Added
Description M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update endpoint with a crafted payload to grant administrative access to a standard user account.
Title M/Monit 3.7.4 - Privilege Escalation
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-29T18:11:51.431Z

Reserved: 2026-01-27T15:47:07.998Z

Link: CVE-2020-36969

cve-icon Vulnrichment

Updated: 2026-01-28T18:58:56.418Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T18:16:47.317

Modified: 2026-02-03T15:44:12.940

Link: CVE-2020-36969

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-29T09:09:30Z

Weaknesses