Pelican Web UI Privilege Escalation Vulnerability
A privilege escalation vulnerability in Pelican WebUI versions v7.21 to v7.24 allows authenticated users to gain admin privileges by manipulating database records, potentially leading to configuration modification, API token creation, and password changes.
On April 2nd, 2026, a privilege escalation vulnerability was identified in the Pelican Web User Interface (WebUI) affecting versions v7.21 to v7.24. This vulnerability allows any authenticated user via OAuth to gain admin privileges under specific configurations, including servers with Server.UIAdminUsers where listed users haven’t logged in or Server.AdminGroups with Issuer.GroupSource set to internal where an admin hasn’t logged in. Successful exploitation permits attackers to modify server configurations, create API tokens, and change admin passwords. The OSDF operations team mitigated this vulnerability for core services, but mitigation may be required for other caches and origins. There is currently no evidence this attack has been exploited in services managed by OSDF operators.
Attack Chain
- An attacker gains initial access to the Pelican WebUI by authenticating via OIDC.
- The attacker identifies a valid
Server.UIAdminUsersusername orServer.AdminGroupsgroup name for an admin who has not yet logged into the WebUI. - The attacker crafts malicious database records designed to grant admin privileges upon subsequent login.
- The attacker injects these records into the Pelican server’s SQLite database, potentially using API endpoints or other methods to interact with the database.
- The attacker logs out of the WebUI.
- The attacker logs back into the WebUI.
- The server grants the attacker admin privileges based on the manipulated database records.
- The attacker modifies server configurations, creates persistent API tokens, or changes admin passwords.
Impact
The successful exploitation of this vulnerability poses a significant risk to Pelican servers and the wider federation they support. A compromised Director service could have high federation-wide impact, enabling denial of service and redirection to malicious registries. Registry services also have high federation-wide impact, with attackers potentially poisoning namespaces. Compromised Origins could lead to high data exposure and tampering risks by enabling unauthorized writes and changing export paths. Caches present a medium data exposure risk, as attackers could expose cached protected data.
Recommendation
- Run the provided mitigation script (
mitigate-user-escalation.shfrom https://gist.github.com/jhiemstrawisc/8c4b2b3ec5cb2ca06537d9439dc16cc9) to audit the database for signs of exploitation and block further exploitation. - Upgrade Pelican servers to a patched release (>=v7.21.5, >=v7.22.3, >=v7.23.3, >=v7.24.2).
- If unable to upgrade immediately, disable the vulnerable configuration by commenting out
UIAdminUsersandAdminGroupssettings in thepelican.yamlconfiguration file. - Monitor process executions for the
mitigate-user-escalation.shscript and review associated user and API token changes. Deploy the provided Sigma rule to detect potential malicious activity.
Detection coverage 2
Detect Execution of Mitigation Script
mediumDetects execution of the `mitigate-user-escalation.sh` script used to remediate the Pelican WebUI privilege escalation vulnerability.
Detect Suspicious SQLite Activity Related to Pelican WebUI
highDetects SQLite commands potentially indicative of exploitation of the Pelican WebUI privilege escalation vulnerability, focusing on user table modifications.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
url
| Type | Value |
|---|---|
| url | https://gist.github.com/jhiemstrawisc/8c4b2b3ec5cb2ca06537d9439dc16cc9 |