MantisBT is vulnerable to authentication bypass through the SOAP API on MySQL
Critical severity
GitHub Reviewed
Published
Mar 23, 2026
in
mantisbt/mantisbt
•
Updated Mar 23, 2026
Description
Published to the GitHub Advisory Database
Mar 23, 2026
Reviewed
Mar 23, 2026
Last updated
Mar 23, 2026
Mantis Bug Tracker instances running on MySQL and compatible databases are affected by an authentication bypass vulnerability in the SOAP API, as a result of improper type checking on the password parameter.
Other database backends are not affected, as they do not perform implicit type conversion from string to integer.
Impact
Using a crafted SOAP envelope, an attacker knowing the victim's username is able to login to the SOAP API with their account without knowledge of the actual password, and execute any API function they have access to.
Patches
Workarounds
Resources
Credits
MantisBT thanks Alexander Philiotis of SynerComm for discovering and responsibly reporting the issue.
References