Description
Inappropriate user token revocation due to a logic error in the token revocation endpoint implementation in Cloudfoundry UAA v77.30.0 to v78.7.0 and in Cloudfoundry Deployment v48.7.0 to v54.10.0.
Published: 2026-03-05
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Failure to revoke user tokens, potentially allowing unauthorized continued access
Action: Assess Impact
AI Analysis

Impact

In Cloudfoundry UAA versions 77.30.0 to 78.7.0 and Cloudfoundry Deployment releases 48.7.0 to 54.10.0, a logic error in the token revocation endpoint causes tokens to not be revoked when a user requests revocation. The flaw results in a failure of the revocation process, allowing a token that was meant to be invalidated to continue to grant access. Without revocation, an attacker who had cached or stolen a valid token or who is a compromised user could use the token indefinitely, leading to persistence of elevated privileges.

Affected Systems

This vulnerability affects the Cloud Foundry UAA component and Cloud Foundry deployment releases. The specific impacted product families are Cloudfoundry Foundation UAA versions 77.30.0 through 78.7.0 and Cloudfoundry Deployment releases 48.7.0 through 54.10.0. The vulnerability is present in all 7.x versions between those ranges but does not affect other Cloud Foundry components beyond UAA or earlier/ later releases outside the indicated ranges.

Risk and Exploitability

The CVSS base score is 6.5, indicating moderate severity, and the EPSS score is less than 1%, showing a low likelihood of exploitation at present. The flaw is not listed in the CISA KEV catalog. Exploitation requires the attacker to trigger the revocation endpoint or otherwise influence the revocation logic, which is typically only available to authenticated users controlling a token. Because the flaw does not allow arbitrary code execution or privilege escalation beyond token misuse, the primary risk is continued elevated privileges if a token is already compromised.

Generated by OpenCVE AI on April 16, 2026 at 12:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cloudfoundry UAA update that contains the fix, as announced by the vendor.
  • Restrict the token revocation endpoint to trusted services by using network segmentation or firewall rules.
  • Implement continuous monitoring of token activity to detect anomalous persistence and enforce periodic token renewal.

Generated by OpenCVE AI on April 16, 2026 at 12:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6wcw-r64p-qrrw Cloudfoundry UAA has logic error in the token revocation endpoint implementation
History

Thu, 16 Apr 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-640

Tue, 17 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Cloudfoundry cf-deployment
Cloudfoundry uaa-release
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*
cpe:2.3:a:cloudfoundry:uaa-release:*:*:*:*:*:*:*:*
Vendors & Products Cloudfoundry cf-deployment
Cloudfoundry uaa-release

Fri, 06 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Cloudfoundry
Cloudfoundry uaa
Vendors & Products Cloudfoundry
Cloudfoundry uaa

Thu, 05 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description Inappropriate user token revocation due to a logic error in the token revocation endpoint implementation in Cloudfoundry UAA v77.30.0 to v78.7.0 and in Cloudfoundry Deployment v48.7.0 to v54.10.0.
Title UAA User Token Revocation logic error
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Cloudfoundry Cf-deployment Uaa Uaa-release
cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-03-06T16:31:36.817Z

Reserved: 2026-01-09T06:54:36.841Z

Link: CVE-2026-22723

cve-icon Vulnrichment

Updated: 2026-03-06T16:31:33.348Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T21:16:14.610

Modified: 2026-03-17T18:35:29.637

Link: CVE-2026-22723

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:15:35Z

Weaknesses