CVE-2026-40043 PUBLISHED

Pachno 1.0.6 Authentication Bypass via runSwitchUser()

Assigner: VulnCheck
Reserved: 08.04.2026 Published: 13.04.2026 Updated: 13.04.2026

Pachno 1.0.6 contains an authentication bypass vulnerability in the runSwitchUser() action that allows authenticated low-privilege users to escalate privileges by manipulating the original_username cookie. Attackers can set the client-controlled original_username cookie to any value and request a switch to user ID 1 to obtain session tokens or password hashes belonging to administrator accounts.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 7.1

Product Status

Vendor pancho
Product Pachno
Versions
  • Version 1.0.6 is affected

Credits

  • LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

Problem Types

  • Authorization Bypass Through User-Controlled Key CWE