CVE-2026-30849 PUBLISHED

MantisBT SOAP API has an authentication bypass vulnerability on MySQL

Assigner: GitHub_M
Reserved: 05.03.2026 Published: 23.03.2026 Updated: 23.03.2026

Mantis Bug Tracker (MantisBT) is an open source issue tracker. Versions prior to 2.28.1 running on MySQL family databases are affected by an authentication bypass vulnerability in the SOAP API, as a result of an improper type checking on the password parameter. Other database backends are not affected, as they do not perform implicit type conversion from string to integer. Using a crafted SOAP envelope, an attacker knowing the victim's username is able to login to the SOAP API with their account without knowledge of the actual password, and execute any API function they have access to. Version 2.28.1 contains a patch. Disabling the SOAP API significantly reduces the risk, but still allows the attacker to retrieve user account information including email address and real name.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor mantisbt
Product mantisbt
Versions
  • Version < 2.28.1 is affected

References

Problem Types

  • CWE-305: Authentication Bypass by Primary Weakness CWE