CVE-2026-30849
Mantis Bug Tracker instances running on MySQL and compatible databases are affected by an authentication bypass vulnerability in the SOAP API, as a result of improper type checking on the password parameter.
Other database backends are not affected, as they do not perform implicit type conversion from string to integer.
Impact
Using a crafted SOAP envelope, an attacker knowing the victim's username is able to login to the SOAP API with their account without knowledge of the actual password, and execute any API function they have access to.
Patches
- b349e5c890eeda9bd82e7c7e14479853f8a30d9f
Workarounds
- Disabling the SOAP API significantly reduces the risk, but still allows the attacker to retrieve user account information including email address and real name.
Resources
- https://mantisbt.org/bugs/view.php?id=36902
Credits
MantisBT thanks Alexander Philiotis of SynerComm for discovering and responsibly reporting the issue.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/mantisbt/mantisbt/security/advisories/GHSA-phrq-pc6r-f6gh, https://github.com/mantisbt/mantisbt/commit/b349e5c890eeda9bd82e7c7e14479853f8a30d9f, https://github.com/mantisbt/mantisbt
