Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-85qv-cf4w-f5mj

Опубликовано: 28 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.6

Описание

microCLAUDIA in v3.2.0 and prior has an improper access control vulnerability.

This flaw allows an authenticated user to perform unauthorized actions on other organizations' systems by sending direct API requests. To do so, the attacker can use organization identifiers obtained through a compromised endpoint or deduced manually.

This vulnerability allows access between tenants, enabling an attacker to list and manage remote assets, uninstall agents, and even delete vaccines configurations.

microCLAUDIA in v3.2.0 and prior has an improper access control vulnerability.

This flaw allows an authenticated user to perform unauthorized actions on other organizations' systems by sending direct API requests. To do so, the attacker can use organization identifiers obtained through a compromised endpoint or deduced manually.

This vulnerability allows access between tenants, enabling an attacker to list and manage remote assets, uninstall agents, and even delete vaccines configurations.

EPSS

Процентиль: 18%
0.00058
Низкий

7.6 High

CVSS4

Дефекты

CWE-306

Связанные уязвимости

nvd
3 месяца назад

microCLAUDIA in v3.2.0 and prior has an improper access control vulnerability. This flaw allows an authenticated user to perform unauthorized actions on other organizations' systems by sending direct API requests. To do so, the attacker can use organization identifiers obtained through a compromised endpoint or deduced manually. This vulnerability allows access between tenants, enabling an attacker to list and manage remote assets, uninstall agents, and even delete vaccines configurations.

EPSS

Процентиль: 18%
0.00058
Низкий

7.6 High

CVSS4

Дефекты

CWE-306