You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Snipe-IT has Privilege Escalation via API Permissions Assignment
High severity
GitHub Reviewed
Published
May 5, 2026
in
grokability/snipe-it
•
Updated May 8, 2026
An authenticated user with only users.edit permission can escalate their own privileges to admin by sending a PATCH request to /api/v1/users/{id} with permissions[admin]=1. The API controller only strips the superuser key from the permissions array, allowing admin and all other permission keys to be set by any user who can update users.
The product does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objects, which can cause them to have less restrictive permissions than intended.
Learn more on MITRE.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Learn more on MITRE.
Impact
An authenticated user with only
users.editpermission can escalate their own privileges toadminby sending a PATCH request to/api/v1/users/{id}withpermissions[admin]=1. The API controller only strips thesuperuserkey from the permissions array, allowingadminand all other permission keys to be set by any user who can update users.Patches
Patched in grokability/snipe-it@ce18ff6, fix was released in v8.4.1
Workarounds
None.
References