Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations. In versions from 3.5.1 and prior, a mass assignment vulnerability in Checkmate's user profile update endpoint allows any authenticated user to escalate their privileges to superadmin, bypassing all role-based access controls. An attacker can modify their user role to gain complete administrative access to the application, including the ability to view all users, modify critical configurations, and access sensitive system data. At time of publication, there are no publicly available patches.
References
| Link | Resource |
|---|---|
| https://github.com/bluewave-labs/Checkmate/security/advisories/GHSA-6368-x7wr-wpm2 | Exploit Vendor Advisory |
Configurations
History
30 Mar 2026, 14:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/bluewave-labs/Checkmate/security/advisories/GHSA-6368-x7wr-wpm2 - Exploit, Vendor Advisory | |
| First Time |
Bluewavelabs checkmate
Bluewavelabs |
|
| CPE | cpe:2.3:a:bluewavelabs:checkmate:*:*:*:*:*:*:*:* |
Information
Published : 2026-03-20 18:16
Updated : 2026-03-30 14:35
NVD link : CVE-2026-31836
Mitre link : CVE-2026-31836
CVE.ORG link : CVE-2026-31836
JSON object : View
Products Affected
bluewavelabs
- checkmate
