The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-44380

CVE-2026-44380: MISP Privilege Escalation Vulnerability

CVE-2026-44380 is a privilege escalation flaw in MISP that allows organization admins to reset site administrator auth keys and gain elevated access. This article covers the technical details, affected versions, and patches.

Published: May 14, 2026

CVE-2026-44380 Overview

CVE-2026-44380 is an improper access control vulnerability in MISP, an open source threat intelligence and sharing platform. The flaw resides in the authentication key reset functionality of MISP versions prior to 2.5.37. An authenticated organization administrator can reset authentication keys belonging to site administrator accounts within the same organization. The application fails to prevent non-site administrators from accessing or resetting site administrator authentication keys. An attacker holding organization administrator privileges can obtain a newly generated authentication key for a higher-privileged account and use it to escalate privileges. The issue is tracked under [CWE-863] Incorrect Authorization and is fixed in MISP 2.5.37.

Critical Impact

An authenticated organization administrator can reset and steal site administrator authentication keys, enabling full privilege escalation within the MISP instance.

Affected Products

  • MISP threat intelligence and sharing platform
  • All MISP versions prior to 2.5.37
  • MISP 2.5.37 contains the official fix

Discovery Timeline

  • 2026-05-13 - CVE-2026-44380 published to NVD
  • 2026-05-13 - Last updated in NVD database

Technical Details for CVE-2026-44380

Vulnerability Analysis

MISP exposes authentication key management endpoints that allow administrators to create, view, and reset API keys. These keys grant programmatic access to the MISP REST API with the privileges of the associated user account. The authorization logic surrounding the key reset action does not validate whether the requesting administrator has equal or greater privileges than the target user. As a result, an organization administrator can invoke the reset operation against a site administrator account in the same organization. MISP returns the freshly generated authentication key in the response, which the attacker can immediately use to authenticate as the higher-privileged user. This produces a complete vertical privilege escalation from organization administrator to site administrator.

Root Cause

The root cause is a missing privilege boundary check in the authentication key reset controller. MISP's role model distinguishes between organization administrators, who manage users within a single organization, and site administrators, who manage the entire instance. The reset workflow only verified that the caller held administrator status within the target user's organization. It did not confirm that the caller's role was equal to or greater than the target's role. This omission falls under [CWE-863] Incorrect Authorization.

Attack Vector

Exploitation requires network access to the MISP web interface and valid organization administrator credentials. The attacker navigates to the user administration interface, selects a site administrator account belonging to the same organization, and triggers the authentication key reset. MISP issues a new API key and exposes it to the attacker. The attacker then sends authenticated requests to the MISP API using the captured key, inheriting site administrator privileges across the instance. Refer to the GitHub Security Advisory GHSA-3939-4g6m-m3hc for further technical context.

Detection Methods for CVE-2026-44380

Indicators of Compromise

  • Unexpected authentication key reset events in MISP audit logs targeting site administrator accounts.
  • API requests originating from new or unfamiliar source addresses using site administrator keys shortly after a reset event.
  • Audit log entries showing organization administrators performing administrative actions against users outside their normal scope.

Detection Strategies

  • Review MISP application logs for users/resetauthkey actions where the actor role is lower than the target role.
  • Correlate authentication key reset events with subsequent API activity from the affected account to identify abuse.
  • Alert on any reset of a site administrator key initiated by a non-site administrator user.

Monitoring Recommendations

  • Enable verbose MISP audit logging and forward logs to a centralized SIEM for retention and correlation.
  • Baseline normal administrative activity per user role and flag deviations such as cross-role key resets.
  • Monitor REST API access patterns for site administrator keys, including geographic and user-agent anomalies.

How to Mitigate CVE-2026-44380

Immediate Actions Required

  • Upgrade all MISP instances to version 2.5.37 or later without delay.
  • Rotate all site administrator authentication keys after upgrading to invalidate any keys that may have been reset by an attacker.
  • Audit recent authentication key reset events and investigate any reset performed by an organization administrator against a site administrator.

Patch Information

The vulnerability is fixed in MISP 2.5.37. The upstream patch enforces a privilege boundary check in the authentication key reset workflow, preventing administrators from resetting keys belonging to users with higher privileges. Full details are published in the MISP GitHub Security Advisory.

Workarounds

  • Restrict organization administrator role assignments to a minimal trusted set of users until the patch is applied.
  • Avoid placing site administrator accounts in shared organizations that also contain organization administrators.
  • Require multi-person review of any administrative role changes and authentication key resets during the remediation window.
bash
# Configuration example: upgrade MISP and rotate site admin auth keys
cd /var/www/MISP
sudo -u www-data git fetch --tags
sudo -u www-data git checkout v2.5.37
sudo -u www-data /var/www/MISP/app/Console/cake Admin updateDatabase
# Then, from the MISP UI, rotate all site administrator authentication keys

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechMisp

  • SeverityHIGH

  • CVSS Score8.6

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-863
  • Technical References
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-44381: MISP Platform SQL Injection Vulnerability

  • CVE-2026-44379: MISP UUID Validation Vulnerability

  • CVE-2026-44363: MISP Modules SSRF Vulnerability

  • CVE-2026-39962: MISP Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English