CVE-2025-27134 Scanner

Detects privilege escalation vulnerability in Joplin Server prior to 3.3.3 via insecure user update API.

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

8 days 18 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, a privilege escalation vulnerability exists in the Joplin server, allowing non-admin users to exploit the API endpoint `PATCH /api/users/-id` to set the `is_admin` field to 1. The vulnerability allows malicious low-privileged users to perform administrative actions without proper authorization. This issue has been patched in version 3.3.3. Prior to version 3.3.3, a critical vulnerability exists in Joplin ServerCVE-2025-27134.

The vulnerability lies in the PATCH /api/users/{id} API endpoint, where any authenticated user can modify their own is_admin flag to 1, granting them full administrator privileges.

Once elevated, the user can perform administrative operations such as creating/deleting users and accessing all server data.

References:

Get started to protecting your digital assets