Genealogy PHP Application Broken Access Control Vulnerability (CVE-2026-39355)
A critical broken access control vulnerability (CVE-2026-39355) in Genealogy PHP application versions prior to 5.9.1 allows authenticated users to transfer ownership of arbitrary teams, leading to complete takeover of team workspaces and unrestricted data access.
Genealogy is a family tree PHP application that, prior to version 5.9.1, contained a critical broken access control vulnerability identified as CVE-2026-39355. This flaw allows any authenticated user to transfer ownership of non-personal teams to themselves without proper authorization checks. This unauthorized ownership transfer leads to complete takeover of other users’ team workspaces, granting the attacker unrestricted access to all genealogy data associated with the compromised team. This vulnerability poses a significant risk to data confidentiality and integrity within organizations using affected versions of the Genealogy application. Version 5.9.1 addresses and resolves this vulnerability.
Attack Chain
- An attacker authenticates to the Genealogy application with valid user credentials.
- The attacker identifies a target “team” within the application that is not their own.
- The attacker crafts a malicious HTTP request to the application’s team ownership transfer functionality, specifying the target team and the attacker’s user ID as the new owner.
- Due to the broken access control vulnerability (CVE-2026-39355), the application fails to validate the attacker’s authorization to perform the ownership transfer.
- The application incorrectly updates the team’s ownership data, assigning ownership to the attacker.
- The attacker now possesses full administrative control over the compromised team’s workspace and data.
- The attacker accesses and exfiltrates sensitive genealogy data, including family trees, personal information, and other confidential records.
Impact
Successful exploitation of CVE-2026-39355 allows an attacker to gain complete control over targeted teams within the Genealogy application. This leads to unauthorized access to sensitive genealogy data, potentially impacting all users and families represented within the compromised teams. The impact includes data exfiltration, modification, or deletion, potentially causing significant reputational damage and legal liabilities. While the exact number of affected installations is unknown, all organizations running versions prior to 5.9.1 are vulnerable.
Recommendation
- Immediately upgrade the Genealogy application to version 5.9.1 or later to patch CVE-2026-39355.
- Monitor web server logs for suspicious POST requests to team management endpoints, specifically those related to team ownership transfer. Use the provided Sigma rule
Detect Suspicious Genealogy Team Ownership Transferto detect unauthorized attempts. - Implement strict access control policies within the Genealogy application, ensuring that users can only access and modify data related to teams they are authorized to manage.
- Enable detailed logging for all user authentication and authorization events within the Genealogy application to facilitate incident investigation.
Detection coverage 2
Detect Suspicious Genealogy Team Ownership Transfer
criticalDetects potential exploitation of CVE-2026-39355 by monitoring for suspicious POST requests to team management endpoints associated with ownership transfers in Genealogy PHP application.
Detect Genealogy Application Version Prior to 5.9.1
mediumDetects web requests from Genealogy application version prior to 5.9.1, which are vulnerable to CVE-2026-39355.
Detection queries are kept inside the platform. Get full rules →