CVE-2026-5652 - Vulnerability Analysis
CriticalCVSS: 9.0Last Updated: April 21, 2026
Crafty Controller - Broken Access Control
Overview
Crafty Controller contains an insecure direct object reference caused by improper API permissions validation in the Users API component, letting remote authenticated attackers modify user data.
Severity & Score
Impact
Remote authenticated attackers can modify user data, potentially leading to unauthorized changes or privilege escalation.
Mitigation
Update to the latest version with proper API permissions validation.
Social Media Activity(1 post)
š“ CVE-2026-5652 - Critical (9) An insecure direct object reference vulnerability in the Users API component of Crafty Controller allows a remote, authenticated attacker to perform user modification actions via improper API permissions validation. š https://www.thehackerwire.com/vulnerability/CVE-2026-5652/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-5652
- Severity
- Critical
- CVSS Score
- 9.0
- Type
- broken_access_control
- Status
- new
- EPSS
- 0.0%
- Social Posts
- 1
CWE
- CWE-639
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L