Description
Inadequate access control in the registration process in Fullstep V5, which could allow unauthenticated users to obtain a valid JWT token with which to interact with authenticated API resources. Successful exploitation of this vulnerability could allow an unauthenticated attacker to compromise the confidentiality of the affected resource, provided they have a valid token with which to interact with the API.
Published: 2026-04-22
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access and potential data exposure through unauthenticated token acquisition
Action: Immediate Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

The vulnerability has been fixed by the Fullstep team in version 5.30.07, which has been available in production since January 29, 2026.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description Inadequate access control in the registration process in Fullstep V5, which could allow unauthenticated users to obtain a valid JWT token with which to interact with authenticated API resources. Successful exploitation of this vulnerability could allow an unauthenticated attacker to compromise the confidentiality of the affected resource, provided they have a valid token with which to interact with the API.
Title Inadequate access control vulnerability in Fullstep
First Time appeared Fullstep
Fullstep fullstep
Weaknesses CWE-306
CPEs cpe:2.3:a:fullstep:fullstep:5.30.07:*:*:*:*:*:*:*
cpe:2.3:a:fullstep:fullstep:5:*:*:*:*:*:*:*
Vendors & Products Fullstep
Fullstep fullstep
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Fullstep Fullstep
cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2026-04-22T14:06:57.793Z

Reserved: 2026-04-07T15:31:14.737Z

Link: CVE-2026-5749

cve-icon Vulnrichment

Updated: 2026-04-22T14:02:57.631Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-22T14:17:05.993

Modified: 2026-04-22T21:23:52.620

Link: CVE-2026-5749

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T19:55:03Z

Weaknesses