CVE-2026-6355
Received Received - Intake
Insecure Direct Object Reference in Web App Enables Unauthorized Data Access

Publication date: 2026-04-22

Last updated on: 2026-04-22

Assigner: CERT/CC

Description
A vulnerability in the web application allows unauthorized users to access and manipulate sensitive data across different tenants by exploiting insecure direct object references. This could lead to unauthorized access to sensitive information and unauthorized changes to the tenant's configuration.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-22
Last Modified
2026-04-22
Generated
2026-05-06
AI Q&A
2026-04-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
augmentt augmentt_web_application to 2025-10-01 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in a web application where unauthorized users can exploit insecure direct object references to access and manipulate sensitive data belonging to different tenants.

Insecure direct object references occur when an application exposes internal implementation objects such as files, database records, or keys without proper access control checks.

As a result, attackers can bypass authorization and gain access to data or configurations that should be restricted to other tenants.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to sensitive information from other tenants.

It also allows unauthorized changes to the tenant's configuration, potentially disrupting services or compromising security.

Overall, it can result in data breaches, loss of confidentiality, integrity issues, and damage to trust between tenants.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthorized users to access and manipulate sensitive data across different tenants, leading to unauthorized disclosure and modification of sensitive information.

Such unauthorized access and data manipulation can result in non-compliance with common standards and regulations like GDPR and HIPAA, which require strict protection of personal and sensitive data to ensure confidentiality and integrity.

Failure to prevent cross-tenant data breaches may expose the organization to legal and regulatory penalties due to violations of data protection requirements.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring and intercepting HTTP requests that involve the customerid parameter in the Augmentt web application. An authenticated user can be observed navigating to the companies menu to obtain a customerid, then modifying this parameter in requests to access or modify resources belonging to other tenants.

To detect exploitation attempts, you can capture and analyze HTTP traffic for requests where the customerid parameter is changed to values not associated with the authenticated user.

  • Use a proxy tool like Burp Suite or OWASP ZAP to intercept and inspect HTTP requests to the web application.
  • Look for requests with the customerid parameter and verify if it matches the authenticated user's tenant ID.
  • Example command to capture HTTP traffic on a Linux system: `tcpdump -i eth0 -A -s 0 'tcp port 80 or tcp port 443'`
  • Use curl or similar tools to test unauthorized access by modifying the customerid parameter in requests manually.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps involve enforcing strict authorization checks on the backend before processing any requests involving external identifiers such as customerid.

The system must verify that the authenticated user is authorized to access or modify the requested resource. If the user is unauthorized, the server should reject the request with a generic error response such as HTTP 403 Forbidden or HTTP 404 Not Found.

  • Implement server-side authorization validation for all requests involving tenant-specific data.
  • Reject any requests where the customerid parameter does not belong to the authenticated user's tenant.
  • Monitor logs for suspicious access patterns involving customerid modifications.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart