Metrics
Affected Vendors & Products
No advisories yet.
Solution
The vulnerability has been fixed by the Fullstep team in version 5.30.07, which has been available in production since January 29, 2026.
Workaround
No workaround given by the vendor.
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Inadequate access control in the registration process in Fullstep V5, which could allow unauthenticated users to obtain a valid JWT token with which to interact with authenticated API resources. Successful exploitation of this vulnerability could allow an unauthenticated attacker to compromise the confidentiality of the affected resource, provided they have a valid token with which to interact with the API. | |
| Title | Inadequate access control vulnerability in Fullstep | |
| First Time appeared |
Fullstep
Fullstep fullstep |
|
| Weaknesses | CWE-306 | |
| CPEs | cpe:2.3:a:fullstep:fullstep:5.30.07:*:*:*:*:*:*:* cpe:2.3:a:fullstep:fullstep:5:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fullstep
Fullstep fullstep |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-04-22T14:06:57.793Z
Reserved: 2026-04-07T15:31:14.737Z
Link: CVE-2026-5749
Updated: 2026-04-22T14:02:57.631Z
Status : Received
Published: 2026-04-22T14:17:05.993
Modified: 2026-04-22T14:17:05.993
Link: CVE-2026-5749
No data.
OpenCVE Enrichment
Updated: 2026-04-22T15:15:16Z