CVE-2026-34406
APTRS (Automated Penetration Testing Reporting System) is a Python and Django-based automated reporting tool designed for penetration testers and security organizations. Prior to version 2.0.1, the edituser endpoint (POST /api/auth/edituser/<pk>) allows Any user who can reach that endpoint and submit crafted permission to escalate their own account (or any other account) to superuser by including "issuperuser": true in the request body. The root cause is that CustomUserSerializer explicitly includes issuperuser in its fields list but omits it from readonlyfields, making it a writable field. The edituser view performs no additional validation to prevent non-superusers from modifying this field. Once is_superuser is set to true, gaining unrestricted access to all application functionality without requiring re-authentication. This issue has been patched in version 2.0.1.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/APTRS/APTRS/commit/d1f1b3a5d1953082af8e075712ca29742e900d56, https://github.com/APTRS/APTRS/releases/tag/2.0.1, https://github.com/APTRS/APTRS/security/advisories/GHSA-gv25-wp4h-9c35, https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/34xxx/CVE-2026-34406.json, https://nvd.nist.gov/vuln/detail/CVE-2026-34406
