{"id":"GO-2026-4566","summary":"WireGuard Portal is Vulnerable to Privilege Escalation via User Self-Update to Admin Level in github.com/h44z/wg-portal","details":"WireGuard Portal is Vulnerable to Privilege Escalation via User Self-Update to Admin Level in github.com/h44z/wg-portal.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/h44z/wg-portal before v2.1.3.","aliases":["CVE-2026-27899","GHSA-5rmx-256w-8mj9"],"modified":"2026-03-23T04:52:44.388977Z","published":"2026-03-10T18:28:01Z","database_specific":{"url":"https://pkg.go.dev/vuln/GO-2026-4566","review_status":"UNREVIEWED"},"references":[{"type":"ADVISORY","url":"https://github.com/h44z/wg-portal/security/advisories/GHSA-5rmx-256w-8mj9"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27899"},{"type":"FIX","url":"https://github.com/h44z/wg-portal/commit/fe4485037a25426446ced95050e9498f477bf71d"},{"type":"WEB","url":"https://github.com/h44z/wg-portal/releases/tag/v2.1.3"},{"type":"WEB","url":"https://hub.docker.com/layers/wgportal/wg-portal/v2.1.3/images/sha256-39acfab55598a74e561828b8cb639515ddc222d6c884996111f5ef235aba9e7b"}],"affected":[{"package":{"name":"github.com/h44z/wg-portal","ecosystem":"Go","purl":"pkg:golang/github.com/h44z/wg-portal"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"}]}],"ecosystem_specific":{"custom_ranges":[{"events":[{"introduced":"0"},{"fixed":"2.1.3"}],"type":"ECOSYSTEM"}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2026-4566.json"}}],"schema_version":"1.7.5"}