An authorization vulnerability exists in Innoshop 0.6.0. After logging into the frontend, an attacker can directly access backend application interfaces, leading to further dangerous operations.
History

Wed, 20 May 2026 16:45:00 +0000

Type Values Removed Values Added
Title Authorization Vulnerability Enabling Backend Access in Innoshop 0.6.0

Wed, 20 May 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Innoshop
Innoshop innoshop
Vendors & Products Innoshop
Innoshop innoshop

Tue, 19 May 2026 22:15:00 +0000

Type Values Removed Values Added
Title Authorization Vulnerability Enabling Backend Access in Innoshop 0.6.0
Weaknesses CWE-284

Tue, 19 May 2026 20:30:00 +0000

Type Values Removed Values Added
Description An authorization vulnerability exists in Innoshop 0.6.0. After logging into the frontend, an attacker can directly access backend application interfaces, leading to further dangerous operations.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-05-19T00:00:00.000Z

Updated: 2026-05-20T13:52:15.489Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-39250

cve-icon Vulnrichment

Updated: 2026-05-20T13:52:11.537Z

cve-icon NVD

Status : Deferred

Published: 2026-05-19T21:16:42.863

Modified: 2026-05-20T14:25:17.977

Link: CVE-2026-39250

cve-icon Redhat

No data.