Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/Penguinsecq/CVE-2026-6356/ |
|
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:augmentt:augmentt:*:*:*:*:*:*:*:* |
Mon, 27 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Augmentt
Augmentt augmentt |
|
| Vendors & Products |
Augmentt
Augmentt augmentt |
Wed, 22 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 CWE-639 |
Wed, 22 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1220 | |
| Metrics |
cvssV3_1
|
Wed, 22 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the web application allows standard users to escalate their privileges to those of a super administrator through parameter manipulation, enabling them to access and modify sensitive information. | |
| Title | CVE-2026-6356 | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-04-22T14:42:10.888Z
Reserved: 2026-04-15T13:51:11.794Z
Link: CVE-2026-6356
Updated: 2026-04-22T14:39:05.435Z
Status : Analyzed
Published: 2026-04-22T14:17:06.720
Modified: 2026-05-12T20:06:18.500
Link: CVE-2026-6356
No data.
OpenCVE Enrichment
Updated: 2026-04-27T19:55:04Z