Inadequate access control in the registration process in Fullstep V5, which could allow unauthenticated users to obtain a valid JWT token with which to interact with authenticated API resources. Successful exploitation of this vulnerability could allow an unauthenticated attacker to compromise the confidentiality of the affected resource, provided they have a valid token with which to interact with the API.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Inadequate access control in the registration process in Fullstep V5, which could allow unauthenticated users to obtain a valid JWT token with which to interact with authenticated API resources. Successful exploitation of this vulnerability could allow an unauthenticated attacker to compromise the confidentiality of the affected resource, provided they have a valid token with which to interact with the API. | |
| Title | Inadequate access control vulnerability in Fullstep | |
| First Time appeared |
Fullstep
Fullstep fullstep |
|
| Weaknesses | CWE-306 | |
| CPEs | cpe:2.3:a:fullstep:fullstep:5.30.07:*:*:*:*:*:*:* cpe:2.3:a:fullstep:fullstep:5:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fullstep
Fullstep fullstep |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published: 2026-04-22T13:23:37.971Z
Updated: 2026-04-22T14:06:57.793Z
Reserved: 2026-04-07T15:31:14.737Z
Link: CVE-2026-5749
Updated: 2026-04-22T14:02:57.631Z
Status : Awaiting Analysis
Published: 2026-04-22T14:17:05.993
Modified: 2026-04-22T21:23:52.620
Link: CVE-2026-5749
No data.