LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-6001 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: May 12, 2026

ABIS Technology Ltd. Co. BAPSİS - Authorization Bypass

Published: May 12, 2026Updated: May 12, 2026Remote Exploitable

Overview

ABIS Technology Ltd. Co. BAPSİS < 202604152042 contains an authorization bypass caused by user-controlled key vulnerability, letting attackers exploit trusted identifiers to bypass authorization, exploit requires no special privileges.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 3.8%(Probability of exploitation in next 30 days)

Impact

Attackers can bypass authorization, gaining unauthorized access to protected resources or actions.

Mitigation

Update to version 202604152042 or later.

Social Media Activity(2 posts)

TheHackerWire
TheHackerWire
@thehackerwire
May 12, 2026

🟠 CVE-2026-6001 - High (8.8) Authorization bypass through User-Controlled key vulnerability in ABIS Technology Ltd. Co. BAPSİS allows Exploitation of Trusted Identifiers. This issue affects BAPSİS: before v.202604152042. 🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6001/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post
TheHackerWire
TheHackerWire
@thehackerwire
May 12, 2026

🟠 CVE-2026-6001 - High (8.8) Authorization bypass through User-Controlled key vulnerability in ABIS Technology Ltd. Co. BAPSİS allows Exploitation of Trusted Identifiers. This issue affects BAPSİS: before v.202604152042. 🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6001/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-6001
Severity
High
CVSS Score
8.8
Type
broken_access_control
Status
rejected
EPSS
3.8%
Social Posts
2

CWE

  • CWE-639

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS Score

3.8%Probability of exploitation in the next 30 days