CVE-2020-36969

M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update endpoint with a crafted payload to grant administrative access to a standard user account.
References
Link Resource
https://mmonit.com/ Product
https://www.exploit-db.com/exploits/49080 Exploit Third Party Advisory VDB Entry
https://www.vulncheck.com/advisories/mmonit-privilege-escalation Third Party Advisory
https://www.exploit-db.com/exploits/49080 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:tildeslash:m\/monit:3.7.4:*:*:*:*:*:*:*

History

03 Feb 2026, 15:44

Type Values Removed Values Added
CPE cpe:2.3:a:tildeslash:m\/monit:3.7.4:*:*:*:*:*:*:*
References () https://mmonit.com/ - () https://mmonit.com/ - Product
References () https://www.exploit-db.com/exploits/49080 - () https://www.exploit-db.com/exploits/49080 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/mmonit-privilege-escalation - () https://www.vulncheck.com/advisories/mmonit-privilege-escalation - Third Party Advisory
First Time Tildeslash
Tildeslash m\/monit

Information

Published : 2026-01-28 18:16

Updated : 2026-02-03 15:44


NVD link : CVE-2020-36969

Mitre link : CVE-2020-36969

CVE.ORG link : CVE-2020-36969


JSON object : View

Products Affected

tildeslash

  • m\/monit
CWE
CWE-863

Incorrect Authorization