Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2026-010 |
|
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wago
Wago device Sphere Wago solution Builder |
|
| Vendors & Products |
Wago
Wago device Sphere Wago solution Builder |
Mon, 30 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, resulting in exposure of sensitive information. | |
| Title | Backend Access Due to Insufficient Input Validation | |
| Weaknesses | CWE-790 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-03-30T18:08:02.801Z
Reserved: 2026-02-11T08:12:03.792Z
Link: CVE-2026-2328
Updated: 2026-03-30T18:07:47.137Z
Status : Awaiting Analysis
Published: 2026-03-30T08:16:17.210
Modified: 2026-03-30T13:26:07.647
Link: CVE-2026-2328
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:41:14Z