Augmentt EUVD-2026-24750

| CVE-2026-6356 CRITICAL
Insufficient Granularity of Access Control (CWE-1220)
2026-04-22 certcc GHSA-pmj4-wrc3-26hm
9.6
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 23, 2026 - 00:15 vuln.today
CVSS changed
Apr 22, 2026 - 15:22 NVD
9.6 (CRITICAL)

DescriptionNVD

A vulnerability in the web application allows standard users to escalate their privileges to those of a super administrator through parameter manipulation, enabling them to access and modify sensitive information.

AnalysisAI

Privilege escalation in Augmentt 1.0 allows authenticated low-privilege users to manipulate HTTP parameters and gain super administrator access, exposing all tenant data and configurations to unauthorized modification. CVSS 9.6 critical severity with scope change indicates cross-tenant impact potential. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

24 hours: Inventory all Augmentt 1.0 deployments and document user privilege levels; implement network segmentation to restrict low-privilege user access to Augmentt administrative interfaces. 7 days: Review audit logs for HTTP parameter manipulation attempts targeting privilege escalation; restrict administrative access to high-assurance authentication methods only; contact Augmentt vendor for patch timeline and interim guidance. …

Sign in for detailed remediation steps.

Share

EUVD-2026-24750 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy