Access Control Bypass Affecting admidio/admidio package, versions >=5.0-Beta.1, <5.0.8


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (23rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Control Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-ADMIDIOADMIDIO-15866087
  • published1 Apr 2026
  • disclosed31 Mar 2026
  • creditJFOZ1010

Introduced: 31 Mar 2026

NewCVE-2026-34381  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade admidio/admidio to version 5.0.8 or higher.

Overview

admidio/admidio is a free open source user management system for websites of organizations and groups.

Affected versions of this package are vulnerable to Access Control Bypass due to improper enforcement of access control in the adm_my_files directory when Apache is configured with AllowOverride None, causing .htaccess restrictions to be ignored. An attacker can access sensitive files intended for restricted roles by directly requesting the file URL, which is disclosed in the upload response JSON.

CVSS Base Scores

version 4.0
version 3.1