| CVE ID | CVE-2026-40550 |
| Publication date | 28 April 2026 |
| Vendor | BinSoft |
| Product | mpGabinet |
| Vulnerable versions | All through 23.12.19 |
| Vulnerability type (CWE) | Execution with Unnecessary Privileges (CWE-250) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2026-40551 |
| Publication date | 28 April 2026 |
| Vendor | BinSoft |
| Product | mpGabinet |
| Vulnerable versions | All through 23.12.19 |
| Vulnerability type (CWE) | Use of Client-Side Authentication (CWE-603) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2026-40552 |
| Publication date | 28 April 2026 |
| Vendor | BinSoft |
| Product | mpGabinet |
| Vulnerable versions | All through 23.12.19 |
| Vulnerability type (CWE) | Incorrect Resource Transfer Between Spheres (CWE-669) |
| Report source | Report to CERT Polska |
Description
CERT Polska has received a report about vulnerabilities in BinSoft mpGabinet software and participated in coordination of their disclosure.
The vulnerability CVE-2026-40550: mpGabinet is vulnerable to Privilege Escalation due to excessive database privileges assigned to the user used by the application. An attacker with access to any running application instance connected to the backend server can extract database credentials from the application’s memory by inspecting the running process. While ability to retreive credentials from memory is expected behavior, the exposed credentials grant administrative access to the database, exceeding the privileges required for normal application functionality. This allows an attacker to perform actions beyond those permitted through the application interface.
The vulnerability CVE-2026-40551: mpGabinet performs client-side authentication. An attacker with access to any application instance connected to the backend server can bypass the login verification process by manipulating the application binary and authenticate as an arbitrary user.
The vulnerability CVE-2026-40552: mpGabinet is vulnerable to Remote Command Execution. An authorized user with access to the application and direct access to the backend database can achieve system command execution by uploading an attachment and modifying its storage path in the database to reference an attacker-controlled remote network resource. Alternatively, it is possible to use a previously uploaded file and change its reference. When the application processes the attachment, and a user tries to open it, the referenced resource is executed by the system. Critically, this vulnerability can be exploited by any unauthenticated attacker by chaining it with CVE-2026-40550 and CVE-2026-40551, which allows obtaining database access, and logging onto any account.
These issues affect mpGabinet version 23.12.19 and below.
Credits
We thank Robert Kruczek and Kamil Szczurowski for the responsible vulnerability report.
More about the coordinated vulnerability disclosure process at CERT Polska can be found at https://cert.pl/en/cvd/.