Cyber Posture

CVE-2026-27591

Critical

Published: 11 March 2026

Published
11 March 2026
Modified
19 March 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0010 28.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27591 is a critical-severity Improper Access Control (CWE-284) vulnerability in Wintercms Winter. Its CVSS base score is 9.9 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 28.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and patching of flaws like this Winter CMS privilege escalation vulnerability to prevent exploitation via crafted requests.

prevent

Mandates enforcement of access controls to block authenticated backend users from unauthorized self-modification of roles and permissions.

prevent

Applies least privilege to limit backend user access, reducing the scope and impact of potential privilege escalations even if enforcement partially fails.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Direct privilege escalation via improper access controls and authorization bypass in authenticated backend session, matching exploitation of a software vulnerability to gain higher privileges.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Winter is a free, open-source content management system (CMS) based on the Laravel PHP framework. Prior to 1.0.477, 1.1.12, and 1.2.12, Winter CMS allowed authenticated backend users to escalate their accounts level of access to the system by modifying the…

more

roles / permissions assigned to their account through specially crafted requests to the backend while logged in. To actively exploit this security issue, an attacker would need access to the Backend with a user account with any level of access. This vulnerability is fixed in 1.0.477, 1.1.12, and 1.2.12.

Deeper analysisAI

CVE-2026-27591 is a privilege escalation vulnerability in Winter CMS, a free open-source content management system built on the Laravel PHP framework. Affected versions are those prior to 1.0.477, 1.1.12, and 1.2.12. The flaw stems from improper access controls (CWE-284, CWE-639, CWE-915), enabling authenticated backend users to modify the roles and permissions assigned to their own accounts through specially crafted requests to the backend while logged in. It carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and potential for full system compromise.

Exploitation requires an attacker to have any level of access to the Winter CMS backend via a valid user account. Once authenticated, the attacker can send tailored HTTP requests to escalate their privileges, potentially gaining administrative control over the CMS. This could lead to unauthorized data access, modification, or deletion, as well as full system takeover given the scope (S:C) and high impacts on confidentiality, integrity, and availability.

The official GitHub security advisory (GHSA-pgpf-m8m4-6cg6) details the issue and confirms remediation in Winter CMS versions 1.0.477, 1.1.12, and 1.2.12. Security practitioners should immediately upgrade to one of these patched releases, available via the project's release notes, and review backend user accounts for signs of unauthorized role changes. No workarounds are specified beyond applying the patches.

Details

CWE(s)

Affected Products

wintercms
winter
≤ 1.0.477 · 1.1.0 — 1.1.12 · 1.2.0 — 1.2.12

CVEs Like This One

CVE-2026-42205Shared CWE-284, CWE-639
CVE-2024-56883Shared CWE-284
CVE-2026-5786Shared CWE-284
CVE-2025-70866Shared CWE-284
CVE-2026-5617Shared CWE-639
CVE-2025-25614Shared CWE-284
CVE-2026-35242Shared CWE-284
CVE-2026-26183Shared CWE-284
CVE-2026-25176Shared CWE-284
CVE-2026-29002Shared CWE-639

References