Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hashgraph
Hashgraph guardian |
|
| Vendors & Products |
Hashgraph
Hashgraph guardian |
Thu, 14 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hedera Guardian through 3.5.1 contains an authentication bypass vulnerability in the GET /api/v1/demo/registered-users endpoint that allows unauthenticated attackers to retrieve sensitive user information. Attackers can access the endpoint without providing authentication credentials to obtain usernames, Hedera DIDs, parent registry DIDs, system roles, and policy role assignments for all registered users in the system. | |
| Title | Hedera Guardian Authentication Bypass Information Disclosure | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T21:36:22.995Z
Reserved: 2026-05-11T14:14:49.613Z
Link: CVE-2026-45248
No data.
Status : Awaiting Analysis
Published: 2026-05-14T22:16:45.000
Modified: 2026-05-15T14:56:18.253
Link: CVE-2026-45248
No data.
OpenCVE Enrichment
Updated: 2026-05-14T22:30:25Z