CVE-2026-34203
low-risk
Published 2026-03-31
Nautobot is a Network Source of Truth and Network Automation Platform. Prior to versions 2.4.30 and 3.0.10, user creation and editing via the REST API fails to apply the password validation rules defined by Django's AUTH_PASSWORD_VALIDATORS setting (which defaults to an empty list, i.e., no specific rules, but can be configured in Nautobot's nautobot_config.py to apply various rules if desired). This can potentially allow for the creation or modification of users to have passwords that are weak or otherwise do not comply with configured standards. This issue has been patched in versions 2.4.30 and 3.0.10.
Do I need to act?
-
0.03% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
2
CVSS 2.7/10
Low
NETWORK
/ LOW complexity
Affected Products (1)
Nautobot
Affected Vendors
References (5)
Issue Tracking
https://github.com/nautobot/nautobot/pull/8778
Issue Tracking
https://github.com/nautobot/nautobot/pull/8779
19
/ 100
low-risk
Severity
14/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal