CouchCMS Privilege Escalation via f_k_levels_list Parameter Manipulation (CVE-2026-29002)
CouchCMS is vulnerable to privilege escalation, allowing authenticated Admin-level users to create SuperAdmin accounts by manipulating the 'f_k_levels_list' parameter during user creation, granting them full application control.
CVE-2026-29002 identifies a privilege escalation vulnerability in CouchCMS. This flaw allows authenticated users with Admin-level privileges to elevate their access to SuperAdmin by tampering with the f_k_levels_list parameter during the user creation process. By modifying the value of this parameter from “4” to “10” in the HTTP request body, an attacker can bypass authorization checks, effectively circumventing restrictions on SuperAdmin account creation and privilege assignment. This vulnerability allows the attacker to gain complete control over the CouchCMS application. Successful exploitation requires valid Admin-level credentials and the ability to modify HTTP request parameters.
Attack Chain
- An attacker obtains valid Admin-level credentials for a CouchCMS instance.
- The attacker navigates to the user creation page within the CouchCMS admin panel.
- The attacker intercepts the HTTP request generated when submitting the user creation form.
- The attacker modifies the
f_k_levels_listparameter in the HTTP request body, changing its value from “4” (Admin) to “10” (SuperAdmin). - The attacker submits the modified HTTP request to the CouchCMS server.
- The CouchCMS server, due to insufficient authorization validation, creates a new user account with SuperAdmin privileges.
- The attacker logs in with the newly created SuperAdmin account.
- The attacker gains full control over the CouchCMS application, including the ability to modify system settings, access sensitive data, and potentially compromise the underlying server.
Impact
Successful exploitation of CVE-2026-29002 leads to complete compromise of the CouchCMS application. An attacker with SuperAdmin privileges can access and modify any data within the CMS, potentially defacing websites, stealing sensitive information, or disrupting services. The vulnerability affects all CouchCMS installations where user creation is enabled and accessible to Admin-level users.
Recommendation
- Apply the patch or upgrade to a version of CouchCMS that addresses CVE-2026-29002.
- Deploy the Sigma rule
Detect CouchCMS SuperAdmin Creation via Parameter Tamperingto your SIEM to detect attempts to exploit this vulnerability. - Monitor web server logs for POST requests to the user creation endpoint with a modified
f_k_levels_listparameter. - Implement strict input validation and authorization checks on the server-side to prevent unauthorized modification of user privileges.
Detection coverage 2
Detect CouchCMS SuperAdmin Creation via Parameter Tampering
criticalDetects attempts to create SuperAdmin accounts in CouchCMS by tampering with the f_k_levels_list parameter.
Detect CouchCMS Admin Panel Access
lowDetects access to the CouchCMS administration panel login page.
Detection queries are kept inside the platform. Get full rules →