Skip to content
Threat Feed
critical advisory

Genealogy PHP Application Broken Access Control Vulnerability (CVE-2026-39355)

A critical broken access control vulnerability (CVE-2026-39355) in Genealogy PHP application versions prior to 5.9.1 allows authenticated users to transfer ownership of arbitrary teams, leading to complete takeover of team workspaces and unrestricted data access.

Genealogy is a family tree PHP application that, prior to version 5.9.1, contained a critical broken access control vulnerability identified as CVE-2026-39355. This flaw allows any authenticated user to transfer ownership of non-personal teams to themselves without proper authorization checks. This unauthorized ownership transfer leads to complete takeover of other users’ team workspaces, granting the attacker unrestricted access to all genealogy data associated with the compromised team. This vulnerability poses a significant risk to data confidentiality and integrity within organizations using affected versions of the Genealogy application. Version 5.9.1 addresses and resolves this vulnerability.

Attack Chain

  1. An attacker authenticates to the Genealogy application with valid user credentials.
  2. The attacker identifies a target “team” within the application that is not their own.
  3. The attacker crafts a malicious HTTP request to the application’s team ownership transfer functionality, specifying the target team and the attacker’s user ID as the new owner.
  4. Due to the broken access control vulnerability (CVE-2026-39355), the application fails to validate the attacker’s authorization to perform the ownership transfer.
  5. The application incorrectly updates the team’s ownership data, assigning ownership to the attacker.
  6. The attacker now possesses full administrative control over the compromised team’s workspace and data.
  7. The attacker accesses and exfiltrates sensitive genealogy data, including family trees, personal information, and other confidential records.

Impact

Successful exploitation of CVE-2026-39355 allows an attacker to gain complete control over targeted teams within the Genealogy application. This leads to unauthorized access to sensitive genealogy data, potentially impacting all users and families represented within the compromised teams. The impact includes data exfiltration, modification, or deletion, potentially causing significant reputational damage and legal liabilities. While the exact number of affected installations is unknown, all organizations running versions prior to 5.9.1 are vulnerable.

Recommendation

  • Immediately upgrade the Genealogy application to version 5.9.1 or later to patch CVE-2026-39355.
  • Monitor web server logs for suspicious POST requests to team management endpoints, specifically those related to team ownership transfer. Use the provided Sigma rule Detect Suspicious Genealogy Team Ownership Transfer to detect unauthorized attempts.
  • Implement strict access control policies within the Genealogy application, ensuring that users can only access and modify data related to teams they are authorized to manage.
  • Enable detailed logging for all user authentication and authorization events within the Genealogy application to facilitate incident investigation.

Detection coverage 2

Detect Suspicious Genealogy Team Ownership Transfer

critical

Detects potential exploitation of CVE-2026-39355 by monitoring for suspicious POST requests to team management endpoints associated with ownership transfers in Genealogy PHP application.

sigma tactics: cve-2026-39355, privilege_escalation techniques: T1068 sources: webserver, linux

Detect Genealogy Application Version Prior to 5.9.1

medium

Detects web requests from Genealogy application version prior to 5.9.1, which are vulnerable to CVE-2026-39355.

sigma tactics: cve-2026-39355, initial_access techniques: T1190 sources: webserver, linux

Detection queries are kept inside the platform. Get full rules →