CVE-2026-6356
CRITICALDescription
A vulnerability in the web application allows standard users to escalate their privileges to those of a super administrator through parameter manipulation, enabling them to access and modify sensitive information.
CVSS v3.1 Score
EPSS — Exploit Prediction
EPSS estimates the probability that this vulnerability will be exploited in the wild within the next 30 days. A higher score means more likely to be exploited.
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| augmentt | augmentt |
References
Frequently Asked Questions
What is CVE-2026-6356? +
How severe is CVE-2026-6356? +
What products are affected by CVE-2026-6356? +
How do I check if I'm vulnerable to CVE-2026-6356? +
Related Vulnerabilities
A vulnerability has been identified in the Now Platform that could result in data being inferred without authorization. Under certain …
Improper Input Validation in the AMD RAID driver could allow an attacker to point to an arbitrary memory location potentially …
This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 18.4.1 and iPadOS 18.4.1, macOS …
A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate …
A privilege escalation flaw from host to domain administrator was found in FreeIPA. This vulnerability is similar to CVE-2025-4404, where …
Insufficient Granularity of Access Control vulnerability in opentext Flipper allows Exploiting Incorrectly Configured Access Control Security Levels. The vulnerability could …