CVE-2026-32102 Overview
OliveTin is a web interface that provides access to predefined shell commands. A broken access control vulnerability exists in OliveTin version 3000.10.2 and earlier where the live EventStream broadcasts execution events and action output to authenticated dashboard subscribers without enforcing per-action authorization. This allows a low-privileged authenticated user to receive output from actions they are not permitted to view, resulting in sensitive information disclosure.
Critical Impact
Authenticated users with low privileges can access sensitive command output from restricted actions, bypassing authorization controls and exposing confidential data through the EventStream broadcast mechanism.
Affected Products
- OliveTin version 3000.10.2 and earlier
Discovery Timeline
- 2026-03-11 - CVE CVE-2026-32102 published to NVD
- 2026-03-12 - Last updated in NVD database
Technical Details for CVE-2026-32102
Vulnerability Analysis
This vulnerability falls under CWE-284 (Improper Access Control), where the OliveTin application fails to properly enforce authorization checks on its EventStream functionality. The core issue lies in the design of the real-time event broadcasting system that streams execution events and command output to all authenticated dashboard subscribers indiscriminately.
When an action is executed in OliveTin, the results and output are pushed through the EventStream to connected clients. However, the application does not validate whether each connected client has the appropriate permissions to view the specific action being broadcast. This architectural flaw means that any authenticated user—regardless of their actual permission level—can observe output from privileged actions they should not have access to.
The impact of this vulnerability is significant in multi-user environments where OliveTin is used to manage sensitive operations. Administrative commands, configuration outputs, or any action containing confidential information could be exposed to unauthorized users simply by maintaining an active dashboard connection.
Root Cause
The root cause of this vulnerability is the absence of per-action authorization enforcement in the EventStream broadcasting mechanism. The OliveTin application authenticates users for dashboard access but fails to implement granular access control checks when streaming action output events. The EventStream broadcasts events to all authenticated subscribers without filtering based on the user's permission to view specific actions.
Attack Vector
An attacker with valid low-privileged credentials can exploit this vulnerability by establishing a connection to the OliveTin dashboard EventStream. Once connected, the attacker passively receives all execution events and action outputs broadcast through the stream, including those from actions they are not authorized to access. The attack requires no special tools or techniques beyond maintaining an authenticated session—the sensitive information is automatically delivered through the normal EventStream functionality.
The vulnerability is exploitable over the network by any authenticated user, making it particularly concerning in environments where multiple users with varying permission levels access the same OliveTin instance. The attacker can capture sensitive data such as command outputs, configuration details, or any information exposed through restricted actions.
Detection Methods for CVE-2026-32102
Indicators of Compromise
- Unusual patterns of EventStream connections from low-privileged user accounts remaining active for extended periods
- Increased number of concurrent dashboard sessions from accounts that typically do not require real-time monitoring
- Log entries showing authentication from IP addresses or user agents inconsistent with expected administrative access patterns
Detection Strategies
- Monitor EventStream connection patterns to identify users maintaining connections outside of their normal operational requirements
- Implement logging of all EventStream subscriptions with user identity correlation to detect anomalous access patterns
- Review authentication logs for low-privileged accounts with unusually high dashboard activity or connection duration
Monitoring Recommendations
- Enable detailed logging of OliveTin dashboard connections and EventStream subscriptions with user attribution
- Establish baselines for normal EventStream usage patterns per user role to identify deviations
- Configure alerts for concurrent connections from accounts that should have limited dashboard access
How to Mitigate CVE-2026-32102
Immediate Actions Required
- Upgrade OliveTin to a patched version that addresses the broken access control vulnerability
- Review and restrict user accounts to ensure only necessary personnel have dashboard access
- Audit action permissions to verify sensitive operations are properly restricted
- Consider temporarily disabling the EventStream feature if possible until patching is complete
Patch Information
Users should consult the GitHub Security Advisory for information on available patches and updated versions. Organizations should prioritize upgrading OliveTin to a version that implements proper per-action authorization checks in the EventStream broadcasting mechanism.
Workarounds
- Limit dashboard access to only users who require real-time action monitoring, reducing exposure of sensitive action outputs
- Implement network-level access controls to restrict which IP addresses can connect to the OliveTin dashboard
- Review and minimize the number of actions that produce sensitive output until the vulnerability is patched
- Consider deploying OliveTin behind a reverse proxy with additional authentication layers to reduce attack surface
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

