CVE-2026-7510
Authorization Bypass in OWASP DefectDojo
Publication date: 2026-04-30
Last updated on: 2026-04-30
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| owasp | defectdojo | to 2.55.4 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OWASP DefectDojo versions up to 2.55.4 within an unknown functionality of the Benchmark/Engagement/Product/Survey component. It allows an attacker to perform a manipulation that leads to an authorization bypass, meaning the attacker can gain unauthorized access or privileges. The attack can be executed remotely, and the exploit has been publicly disclosed.
Upgrading to version 2.56.0, which includes a patch identified as eb6120a379185d37eb1af17b69bb5614a830ab1f, resolves this issue.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker to bypass authorization controls remotely. This means unauthorized users could gain access to restricted areas or perform actions they should not be allowed to, potentially compromising the security and integrity of your system.
What immediate steps should I take to mitigate this vulnerability?
The recommended immediate step to mitigate this vulnerability is to upgrade OWASP DefectDojo to version 2.56.0 or later, as this version addresses the authorization bypass issue.