Cyber Posture

CVE-2026-27796

MediumPublic PoC

Published: 07 March 2026

Published
07 March 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Score 0.0002 6.9th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27796 is a medium-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Homarr Homarr. Its CVSS base score is 5.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Network Service Discovery (T1046); ranked at the 6.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Network Service Discovery (T1046) and 2 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-862 CWE-200

Requiring attribute association with information prevents authorization from being performed without necessary security or privacy context.

addresses: CWE-862 CWE-200

Mandates authorization checks before permitting access or data processing via external systems.

addresses: CWE-862 CWE-200

The control provides a mechanism for authorized users to determine authorization matches, preventing sharing without proper authorization verification.

addresses: CWE-200 CWE-862

Session auditing enables detection of unauthorized exposure or access to sensitive information during user activities.

addresses: CWE-200 CWE-862

Sanitizing equipment to remove specified information before off-site maintenance prevents exposure of sensitive information to unauthorized actors such as external maintenance personnel.

addresses: CWE-200 CWE-862

Requiring detailed, requestable records of every PII disclosure directly aids detection of unauthorized exposures of sensitive information.

addresses: CWE-862 CWE-200

Ensures missing authorization mechanisms for critical data functions are identified and remediated via policy.

addresses: CWE-200 CWE-862

Annual reviews and proposal scrutiny detect and block matching programs that would expose sensitive data to unauthorized recipients or systems.

MITRE ATT&CK Enterprise TechniquesAI

T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1590 Gather Victim Network Information Reconnaissance
Adversaries may gather information about the victim's networks that can be used during targeting.
Why these techniques?

Vuln in public-facing Homarr dashboard exposes unauthenticated endpoint leaking internal service URLs/configs, directly enabling T1190 (exploiting public app), T1590 (gathering victim network info via URLs), and T1046 (service enumeration from integration list).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Homarr is an open-source dashboard. Prior to version 1.54.0, the integration.all tRPC endpoint in Homarr is exposed as a publicProcedure, allowing unauthenticated users to retrieve a complete list of configured integrations. This metadata includes sensitive information such as internal service…

more

URLs, integration names, and service types. This issue has been patched in version 1.54.0.

Deeper analysisAI

CVE-2026-27796 affects Homarr, an open-source dashboard, in versions prior to 1.54.0. The vulnerability stems from the integration.all tRPC endpoint being exposed as a publicProcedure, which permits unauthenticated users to retrieve a complete list of configured integrations. This exposure leaks sensitive metadata, including internal service URLs, integration names, and service types. Rated at CVSS 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), it maps to CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and CWE-862 (Missing Authorization).

Any unauthenticated attacker with network access to a vulnerable Homarr instance can exploit this by directly querying the integration.all endpoint. Successful exploitation yields reconnaissance data on the target's internal services and configurations, potentially facilitating targeted follow-on attacks such as service enumeration, phishing, or exploitation of exposed endpoints. No user interaction, privileges, or special conditions are required beyond reaching the server.

The issue was addressed in Homarr version 1.54.0, as detailed in the project's security advisory (GHSA-m4vc-4prp-cvp7), release notes, and the patching commit. Security practitioners should upgrade to 1.54.0 or later and review exposed configurations for leaked metadata.

Details

CWE(s)

Affected Products

homarr
homarr
≤ 1.54.0

CVEs Like This One

CVE-2026-33510Same product: Homarr Homarr
CVE-2025-64759Same product: Homarr Homarr
CVE-2025-67493Same product: Homarr Homarr
CVE-2026-30845Shared CWE-200, CWE-862
CVE-2025-22612Shared CWE-200, CWE-862
CVE-2026-28276Shared CWE-200, CWE-862
CVE-2025-67974Shared CWE-862
CVE-2026-28254Shared CWE-862
CVE-2026-3266Shared CWE-862
CVE-2025-69297Shared CWE-862

References