Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7m55-2hr4-pw78 | Juju: In-Memory Token Store for Discharge Tokens Lacks Concurrency Safety and Persistence |
Wed, 22 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 10 Apr 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical juju |
|
| Vendors & Products |
Canonical
Canonical juju |
Fri, 10 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper synchronization of the userTokens map in the API server in Canonical Juju 4.0.5, 3.6.20, and 2.9.56 may allow an authenticated user to possibly cause a denial of service on the server or possibly reuse a single-use discharge token. | |
| Title | Juju API Server Denial of Service and Authentication Replay via Unsynchronized Token Map | |
| Weaknesses | CWE-362 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-10T12:41:28.720Z
Reserved: 2026-04-08T07:22:06.115Z
Link: CVE-2026-5774
Updated: 2026-04-10T12:41:02.565Z
Status : Analyzed
Published: 2026-04-10T13:16:46.070
Modified: 2026-04-22T20:46:45.453
Link: CVE-2026-5774
No data.
OpenCVE Enrichment
Updated: 2026-04-13T13:06:05Z
Github GHSA