Cyber Posture

CVE-2026-42569

Critical

Published: 09 May 2026

Published
09 May 2026
Modified
13 May 2026
KEV Added
Patch
CVSS Score 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
EPSS Score 0.0326 87.3th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-42569 is a critical-severity Improper Access Control (CWE-284) vulnerability. Its CVSS base score is 9.4 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 12.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

Explicitly identifying and documenting actions permitted without identification or authentication enforces proper access control boundaries by defining justified exceptions.

Requiring authorization and configuration controls for mobile device connections directly enforces access control and prevents unauthorized devices from reaching organizational systems.

Provides a tamperproof, always-invoked, and verifiable mechanism to enforce access control policies.

Provides capability to review session content, directly detecting violations of access control.

Control assessments verify that access controls are implemented correctly and operating as intended, detecting improper access control before exploitation.

Certification requires independent assessment confirming access controls are implemented correctly and effective.

Authorization servers centrally manage access rights, preventing improper access control.

Tailoring selects and adjusts the precise set of access-control baselines and compensating controls required for the system, directly reducing improper access control exposure.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated access to legacy import feature in public-facing PHP web app (CWE-306/862) directly enables remote exploitation of the application.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

phpVMS is a PHP application to run and simulate an airline. Prior to version 7.0.6, a critical vulnerability in phpVMS allowed unauthenticated access to a legacy import feature. This issue has been patched in version 7.0.6.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

CVEs Like This One

CVE-2025-8025Shared CWE-284, CWE-306
CVE-2025-70146Shared CWE-306, CWE-862
CVE-2025-70986Shared CWE-284, CWE-862
CVE-2026-33951Shared CWE-284, CWE-306
CVE-2026-42222Shared CWE-284, CWE-306
CVE-2026-30784Shared CWE-306, CWE-862
CVE-2026-25058Shared CWE-306, CWE-862
CVE-2025-70985Shared CWE-284, CWE-862
CVE-2025-69220Shared CWE-284, CWE-862
CVE-2025-70141Shared CWE-306, CWE-862

References