An unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, resulting in exposure of sensitive information.
History

Mon, 30 Mar 2026 07:30:00 +0000

Type Values Removed Values Added
Description An unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, resulting in exposure of sensitive information.
Title Backend Access Due to Insufficient Input Validation
Weaknesses CWE-790
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-03-30T06:55:31.424Z

Reserved: 2026-02-11T08:12:03.792Z

Link: CVE-2026-2328

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-30T08:16:17.210

Modified: 2026-03-30T08:16:17.210

Link: CVE-2026-2328

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.