Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes
HomeCVEs

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeCVEsCVE-2026-23946

CVE-2026-23946

Published: January 26, 2026
Last updated:18 hours ago (January 26, 2026)
Exploit: NoZero-day: NoPatch: YesTrend: Neutral
TL;DR
Updated January 26, 2026

CVE-2026-23946 is a medium severity vulnerability with a CVSS score of 6.8. No known exploits currently, and patches are available.

Key Points
  • 1Medium severity (CVSS 6.8/10)
  • 2No known public exploits
  • 3Vendor patches are available
  • 4Strobes Priority Score: 400/1000 (Medium)
Severity Scores
CVSS v36.8
CVSS v20.0
Priority Score400.0
EPSS Score0.0
Medium
Exploitation LikelihoodMinimal
0.00%EPSS

Very low probability of exploitation

Monitor and patch as resources allow
0.00%
EPSS
6.8
CVSS
No
Exploit
Yes
Patch
Low Priority
no major risk factors

EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.

Description

A critical deserialization vulnerability exists in Tendenci Helpdesk module (NOTE, by default, Helpdesk is NOT enabled), affecting the version 15.3.11 and earlier. This vulnerability allows remote code execution (RCE) by an authenticated user with staff security level due to using Python's pickle module on the helpdesk /reports/. The damage is contained to the user that your Tendenci application runs.

Key Finding: The original CVE-2020-14942 was incompletely patched. While ticket_list() was fixed to use safe JSON deserialization, the run_report() function still uses unsafe pickle.loads().

Permission Scoping: The impact is limited to the permissions of the user running the application, typically www-data, which generally lacks write (except for upload directories) and execute permissions.

Vulnerability Details

Affected Version

  • Version: Tendenci 15.3.11 and earlier (all versions since incomplete CVE-2020-14942 patch)
  • Component: tendenci/apps/helpdesk/views/staff.py

Related CVE

  • CVE-2020-14942: Original pickle deserialization vulnerability (partially patched)
  • GitHub Advisory: GHSA-jqmc-fxxp-r589
  • Original Issue: https://github.com/tendenci/tendenci/issues/867

Tendenci User Role Hierarchy

| Level | Role | Description | |-------|------|-------------| | 0 | is_superuser | Highest privilege - full Django admin | | 1 | is_staff | user with Staff security level - can access helpdesk module | | 2 | Authenticated User | Basic user access | | 3 | Anonymous User | Public read-only access |

is_staff is a commonly assigned role (by a superuser) for helpdesk operators who manage support tickets - not system administrators.

Code Comparison (Patched vs Vulnerable)

| Function | Line | Deserialization | Status | |----------|------|-----------------|--------| | ticket_list() | 763 | simplejson.loads() | ✅ SAFE | | run_report() | 1062 | pickle.loads() | ❌ VULNERABLE |

Why This Qualifies for CVE Assignment

This vulnerability represents an incomplete patch bypass for CVE-2020-14942 with a clear exploitation path. The flaw allows a malicious user with Staff security level to achieve Remote Code Execution via Python's pickle.loads. Though the damage is contained to the user that your Tendenci application runs.

Remediation

Update Tendenci to the latest version (v15.3.12 as of now) immediately if you have Helpdesk enabled. Note that Helpdesk is not enabled by default. All of our hosted sites have been patched, although none of our client sites have the Helpdesk enabled.

References

  • Tendenci GitHub: https://github.com/tendenci/tendenci
  • CVE-2020-14942: https://nvd.nist.gov/vuln/detail/CVE-2020-14942
  • GitHub Advisory: https://github.com/advisories/GHSA-jqmc-fxxp-r589
  • Original Issue: https://github.com/tendenci/tendenci/issues/867
  • CWE-502: https://cwe.mitre.org/data/definitions/502.html
  • Python Pickle Security: https://docs.python.org/3/library/pickle.html#restricting-globals
CVSS v3 Breakdown
Attack Vector:Network
Attack Complexity:Local
Privileges Required:High
User Interaction:Required
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability:High
Patch References
Github.comGithub.comGithub.comGithub.com
Trend Analysis
Neutral
Advisories
GitHub AdvisoryNVD
Cite This Page
APA Format
Strobes VI. (2026). CVE-2026-23946 - CVE Details and Analysis. Strobes VI. Retrieved January 27, 2026, from https://vi.strobes.co/cve/CVE-2026-23946
Quick copy link + title

Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.