PatchSiren cyber security CVE debrief
CVE-2026-42571 Unknown Vendor CVE debrief
CVE-2026-42571 is a critical access-control flaw in Pelican's Web User Interface (WebUI). In affected releases, a user authenticated to the WebUI via OAuth can escalate to admin privileges under certain configurations. Fixed releases are 7.21.5, 7.22.3, 7.23.3, and 7.24.2.
- Vendor
- Unknown Vendor
- Product
- Unknown
- CVSS
- CRITICAL 9
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-09
- Original CVE updated
- 2026-05-09
- Advisory published
- 2026-05-09
- Advisory updated
- 2026-05-09
Who should care
Administrators and operators running Pelican WebUI, especially deployments that allow OAuth-based authentication and rely on WebUI role separation. Security teams should treat this as a high-priority authentication and authorization issue.
Technical summary
The provided advisory describes a privilege escalation vulnerability in Pelican WebUI mapped to CWE-863 (incorrect authorization). The issue affects versions 7.21.0 through before 7.21.5, 7.22.0 through before 7.22.3, 7.23.0 through before 7.23.3, and 7.24.0 through before 7.24.2. According to the description, an authenticated OAuth user can gain admin privileges when the vulnerable configuration is present. NVD lists the vulnerability with a CVSS v4.0 score of 9.0 and impact across confidentiality, integrity, and availability.
Defensive priority
Immediate. This is a critical privilege escalation in a management interface, with authenticated access as the starting point. Prioritize patching and access review now.
Recommended defensive actions
- Upgrade Pelican to 7.21.5, 7.22.3, 7.23.3, or 7.24.2, or later in the relevant release line.
- Review WebUI OAuth authentication and authorization settings to confirm only intended users can reach administrative functions.
- Audit existing WebUI admin accounts and recent privilege changes for unexpected elevation.
- If immediate upgrading is not possible, restrict access to the WebUI to trusted administrative networks until remediation is complete.
Evidence notes
This debrief is based only on the supplied CVE/NVD record and the GitHub advisory references. The source description explicitly states the affected versions, the OAuth-authenticated privilege escalation condition, the fixed versions, and the CWE-863 mapping. No additional behavioral details are inferred beyond those sources.
Official resources
CVE-2026-42571 was published on 2026-05-09. The supplied advisory references a GitHub security advisory and a fixing commit, and states that patched releases are 7.21.5, 7.22.3, 7.23.3, and 7.24.2.