CVE-2026-1181

9.0 CRITICAL

📋 TL;DR

Altium 365 workspace endpoints have an overly permissive CORS policy that allows credentialed cross-origin requests from other Altium-controlled subdomains. This enables JavaScript on those origins to access authenticated workspace APIs as logged-in users, potentially leading to unauthorized data access and administrative actions. All Altium 365 workspace users are affected.

💻 Affected Systems

Products:
  • Altium 365 Workspace
Versions: All versions prior to patch
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Altium 365 workspace endpoints with the misconfigured CORS policy.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of workspace data, unauthorized administrative actions, bypass of IP allowlisting controls including in GovCloud environments, and potential lateral movement through chained vulnerabilities.

🟠

Likely Case

Unauthorized access to sensitive workspace data and potential privilege escalation through chained vulnerabilities in external Altium applications.

🟢

If Mitigated

Limited impact if proper network segmentation, IP allowlisting, and monitoring are in place, though the vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires chaining with vulnerabilities in external Altium applications (like forum.live.altium.com) and user authentication to the workspace.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific version

Vendor Advisory: https://www.altium.com/platform/security-compliance/security-advisories

Restart Required: No

Instructions:

1. Review the Altium security advisory. 2. Apply the recommended patch or update to the fixed version. 3. Verify the CORS policy has been tightened to restrict cross-origin requests appropriately.

🔧 Temporary Workarounds

Restrict Access to Altium Subdomains

all

Block or restrict access to known vulnerable Altium subdomains (e.g., forum.live.altium.com) at the network level to prevent exploitation.

Enhance Monitoring

all

Increase monitoring of cross-origin requests to Altium 365 workspace endpoints and look for suspicious activity from Altium subdomains.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Altium 365 workspace from other Altium subdomains.
  • Enforce strong authentication and session management controls to limit the impact of potential credential theft.

🔍 How to Verify

Check if Vulnerable:

Test CORS policy on Altium 365 workspace endpoints by attempting credentialed cross-origin requests from other Altium subdomains (e.g., via browser developer tools or custom scripts).

Check Version:

Check Altium 365 workspace version via the platform's admin interface or contact Altium support.

Verify Fix Applied:

After patching, retest CORS policy to ensure cross-origin requests from unauthorized origins are blocked and only allowed from explicitly permitted domains.

📡 Detection & Monitoring

Log Indicators:

  • Unusual cross-origin requests to workspace APIs from Altium subdomains
  • Failed authentication attempts followed by successful API access from different origins

Network Indicators:

  • HTTP requests with Origin headers pointing to Altium subdomains accessing workspace endpoints
  • Unexpected API calls from forum.live.altium.com or similar domains

SIEM Query:

source_ip IN (altium_subdomain_ips) AND dest_ip = (altium_workspace_ip) AND http_method IN (POST, GET, PUT, DELETE) AND status_code = 200

🔗 References

📤 Share & Export