M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update endpoint with a crafted payload to grant administrative access to a standard user account.
References
| Link | Resource |
|---|---|
| https://mmonit.com/ | Product |
| https://www.exploit-db.com/exploits/49080 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/mmonit-privilege-escalation | Third Party Advisory |
| https://www.exploit-db.com/exploits/49080 | Exploit Third Party Advisory VDB Entry |
Configurations
History
03 Feb 2026, 15:44
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:tildeslash:m\/monit:3.7.4:*:*:*:*:*:*:* | |
| References | () https://mmonit.com/ - Product | |
| References | () https://www.exploit-db.com/exploits/49080 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/mmonit-privilege-escalation - Third Party Advisory | |
| First Time |
Tildeslash
Tildeslash m\/monit |
Information
Published : 2026-01-28 18:16
Updated : 2026-02-03 15:44
NVD link : CVE-2020-36969
Mitre link : CVE-2020-36969
CVE.ORG link : CVE-2020-36969
JSON object : View
Products Affected
tildeslash
- m\/monit
CWE
CWE-863
Incorrect Authorization
