CVE-2026-29789: Php
CVE-2026-29789
Vito is a self-hosted web application that helps manage servers and deploy PHP applications into production servers. Prior to version 3.20.3, a missing authorization check in workflow site-creation ac...
Overview
A critical authorization flaw has been identified in the Vito self-hosted server management platform. This vulnerability allows authenticated users to bypass intended project boundaries and improperly create or manage web application sites on servers they should not have access to.
Vulnerability Explained Simply
Vito organizes infrastructure into separate projects. Normally, a user with “workflow write” access in one project can only manage sites on servers within that same project. Due to a missing authorization check, an attacker with this access level could manipulate a site-creation request. By specifying the ID of a server belonging to a different project, they could perform unauthorized actions on that foreign server. This is a privilege escalation issue that breaks core tenant isolation.
Potential Impact
The impact of this vulnerability is severe. An authenticated attacker could:
- Create, modify, or delete sites on any server managed by the Vito instance, regardless of project boundaries.
- Deploy malicious or unstable code to production environments, causing service disruption.
- Access or corrupt sensitive data hosted on compromised servers.
- Pivot their access to gain further control over an organization’s infrastructure.
This flaw directly threatens the confidentiality, integrity, and availability of all applications and data hosted on servers managed by the vulnerable Vito platform. For context on how such access breaches can escalate, recent incidents are detailed in our breach reports.
Remediation and Mitigation
Immediate action is required to secure affected deployments.
Primary Remediation: The issue is fully patched in Vito version 3.20.3. All users must upgrade to this version immediately. No configuration changes are required post-upgrade.
Mitigation Steps (If Immediate Upgrade is Not Possible):
- Audit User Permissions: Temporarily review and restrict “workflow write” access to only essential, trusted personnel.
- Monitor Logs: Closely monitor Vito application and server logs for any unexpected site-creation or management activities, particularly those referencing server IDs.
- Network Segmentation: Ensure servers managed by Vito are segmented according to the principle of least privilege, limiting the potential blast radius if a server is compromised via this flaw.
Stay informed on emerging threats and patches by following our security news. After applying the patch, organizations should review their systems for any signs of anomalous activity that may have occurred prior to the update.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
CodeAstro Membership Management System 1.0 contains a missing authentication vulnerability in delete_members.php that allows unauthenticated attackers to delete arbitrary member records via the id par...
FileThingie 2.5.7 contains an arbitrary file upload vulnerability that allows attackers to upload malicious files by sending ZIP archives through the ft2.php endpoint. Attackers can upload ZIP files c...
Winter is a free, open-source content management system (CMS) based on the Laravel PHP framework. Prior to 1.0.477, 1.1.12, and 1.2.12, Winter CMS allowed authenticated backend users to escalate their...
WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, a critical SQL injection vulnerability exists in the WeGIA application. The remover_produto_ocultar.php script uses extract(...
Other PHP Vulnerabilities
Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kateg...
Jettweb Php Hazir Ilan Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'kat' parameter....
Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting ...
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the videoid paramet...