LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-28766

CVE-2026-28766 - Vulnerability Analysis

CriticalCVSS: 9.3

Last Updated: April 3, 2026

Gardyn - Broken Access Control

Published: April 3, 2026Updated: April 3, 2026PoC AvailableRemote Exploitable

Overview

Gardyn contains an information disclosure vulnerability caused by an unauthenticated endpoint exposing all user account information, letting remote attackers access sensitive user data without authentication.

Severity & Score

Severity: Critical
CVSS Score: 9.3

Impact

Attackers can access all user account information without authentication, leading to significant data exposure.

Mitigation

Restrict access to the endpoint by implementing proper authentication and authorization controls.

Details

CVE ID
CVE-2026-28766
Severity
Critical
CVSS Score
9.3
Type
broken_access_control
Status
new

CWE

  • CWE-306

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N