Metrics
Affected Vendors & Products
No advisories yet.
Solution
The vulnerability has been fixed by the Fullstep team in version 5.30.07, which has been available in production since January 29, 2026.
Workaround
No workaround given by the vendor.
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An insecure direct object reference (IDOR) vulnerability in the Fullstep V5 registration process allows authenticated users to access data belonging to other registered users through various vulnerable authenticated resources in the application. The vulnerable endpoints result from: '/api/suppliers/v1/suppliers//false' to list user information; and '/#/supplier-registration/supplier-registration//2' to update your user information (personal details, documents, etc.). | |
| Title | Insecure direct object reference (IDOR) vulnerability in Fullstep | |
| First Time appeared |
Fullstep
Fullstep fullstep |
|
| Weaknesses | CWE-639 | |
| CPEs | cpe:2.3:a:fullstep:fullstep:5.30.07:*:*:*:*:*:*:* cpe:2.3:a:fullstep:fullstep:5:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fullstep
Fullstep fullstep |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-04-22T13:59:00.643Z
Reserved: 2026-04-07T15:31:15.848Z
Link: CVE-2026-5750
Updated: 2026-04-22T13:58:50.503Z
Status : Received
Published: 2026-04-22T14:17:06.173
Modified: 2026-04-22T14:17:06.173
Link: CVE-2026-5750
No data.
OpenCVE Enrichment
No data.