Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, live logging and log history for cronjobs. Prior to version 2.2.0, an authentication bypass in middleware allows unauthenticated requests with an invalid session cookie to be treated as authenticated when the middleware’s session-validation fetch fails. This can result in unauthorized access to protected pages and unauthorized execution of privileged Next.js Server Actions. This issue has been patched in version 2.2.0.
Metrics
Affected Vendors & Products
References
History
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, live logging and log history for cronjobs. Prior to version 2.2.0, an authentication bypass in middleware allows unauthenticated requests with an invalid session cookie to be treated as authenticated when the middleware’s session-validation fetch fails. This can result in unauthorized access to protected pages and unauthorized execution of privileged Next.js Server Actions. This issue has been patched in version 2.2.0. | |
| Title | cronmaster: Middleware authentication bypass enabling unauthorized page access and server-action execution | |
| Weaknesses | CWE-287 CWE-306 CWE-693 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-01T17:45:11.248Z
Reserved: 2026-03-25T16:21:40.867Z
Link: CVE-2026-34072
Updated: 2026-04-01T17:45:06.888Z
Status : Received
Published: 2026-04-01T18:16:29.340
Modified: 2026-04-01T18:16:29.340
Link: CVE-2026-34072
No data.
OpenCVE Enrichment
No data.