CVE-2026-31272
Published: 07 April 2026
Summary
CVE-2026-31272 is a critical-severity Improper Access Control (CWE-284) vulnerability in Mrcms Mrcms. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for logical access to system resources, directly addressing the lack of authorization validation in the UserController save() method that allows unauthenticated super administrator creation.
Requires approval and controlled procedures for creating and managing system accounts, preventing unauthorized addition of super administrator accounts.
Employs least privilege to restrict access and privileges, mitigating the impact of unauthorized super administrator account creation by limiting excessive permissions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated remote creation of super-admin accounts in public-facing MRCMS enables T1190 (exploit public-facing app for initial access), T1136/T1136.001 (create local account), and subsequent T1078 (valid accounts abuse).
NVD Description
MRCMS 3.1.2 contains an access control vulnerability. The save() method in src/main/java/org/marker/mushroom/controller/UserController.java lacks proper authorization validation, enabling direct addition of super administrator accounts without authentication.
Deeper analysisAI
CVE-2026-31272 is an access control vulnerability (CWE-284) affecting MRCMS version 3.1.2. The issue resides in the save() method of the UserController class at src/main/java/org/marker/mushroom/controller/UserController.java, which lacks proper authorization validation. This flaw enables unauthenticated users to directly add super administrator accounts.
The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical. Remote attackers with no required privileges or user interaction can exploit it over the network with low complexity. Successful exploitation allows creation of super administrator accounts, resulting in high-impact compromise of confidentiality, integrity, and availability.
Mitigation details are available in the referenced advisory at https://github.com/clockw1se0v0/Vul/blob/main/MRCMS/Unauthorized.md, published on 2026-04-07.
Details
- CWE(s)