An unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, resulting in exposure of sensitive information.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 30 Mar 2026 07:30:00 +0000

Type Values Removed Values Added
Description An unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, resulting in exposure of sensitive information.
Title Backend Access Due to Insufficient Input Validation
Weaknesses CWE-790
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-03-30T06:55:31.424Z

Reserved: 2026-02-11T08:12:03.792Z

Link: CVE-2026-2328

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-30T08:16:17.210

Modified: 2026-03-30T13:26:07.647

Link: CVE-2026-2328

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses