Description
Kiuwan SAST improperly authorizes SSO logins for locally disabled mapped user accounts, allowing disabled users to continue accessing the application. Kiuwan Cloud was affected, and Kiuwan SAST on-premise (KOP) was affected before 2.8.2509.4.
Published: 2026-04-14
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access via SSO for Disabled Accounts
Action: Immediate Patch
AI Analysis

Impact

Kiuwan SAST allows SSO logins for accounts that have been locally disabled, meaning any user marked as disabled in the user directory can still authenticate through the WebUI SSO flow and access the application. This flaw falls under Authentication Failure (CWE-863) and can lead to unauthorized use of the system by accounts that administrators have explicitly disabled, potentially exposing sensitive project data or settings. The vulnerability does not grant elevated privileges beyond what the account normally holds, but it bypasses an explicit security boundary established by disabling the account.

Affected Systems

The flaw affects Kiuwan Cloud and the on‑premises Kiuwan SAST on‑premise (KOP) platform. For Kiuwan Cloud the security issue was resolved with the release dated 29 July 2025; for the on‑premise product, the fix is included in version 2.8.2509.4 and later. Any deployment running a version prior to the respective fixes is vulnerable.

Risk and Exploitability

The CVSS base score of 5.4 marks it as a moderate severity issue, and the EPSS score of less than 1% indicates low exploitation probability. It is not listed in the CISA KEV catalog. The likely attack vector is remote, via the SSO authentication service: an attacker or malicious user with knowledge of a disabled account’s credentials can log in through the SSO flow and evade typical access controls. Because the flaw directly undermines account status enforcement, rapid remediation is advisable to prevent unauthorized access.

Generated by OpenCVE AI on April 14, 2026 at 17:53 UTC.

Remediation

Vendor Solution

The issue was fixed for Kiuwan Cloud on 29 July 2025. For Kiuwan SAST on-premise (KOP), the issue is fixed in version 2.8.2509.4.


OpenCVE Recommended Actions

  • Ensure your Kiuwan Cloud deployment is upgraded to a version released after 29 July 2025
  • Upgrade Kiuwan SAST on‑premise to version 2.8.2509.4 or later
  • Verify that disabled accounts can no longer authenticate through SSO after the upgrade
  • If an upgrade cannot be performed immediately, temporarily disable or reconfigure SSO for disabled accounts until the fix is applied
  • Monitor authentication logs for any SSO logins originating from disabled accounts and investigate anomalous activity

Generated by OpenCVE AI on April 14, 2026 at 17:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
References

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Kiuwan
Kiuwan sast
Vendors & Products Kiuwan
Kiuwan sast

Tue, 14 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 11:45:00 +0000

Type Values Removed Values Added
Description Kiuwan SAST improperly authorizes SSO logins for locally disabled mapped user accounts, allowing disabled users to continue accessing the application. Kiuwan Cloud was affected, and Kiuwan SAST on-premise (KOP) was affected before 2.8.2509.4.
Title Improper Enforcement of Disabled Accounts in WebUI SSO in Kiuwan SAST
Weaknesses CWE-863
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-04-14T18:24:36.801Z

Reserved: 2026-01-21T11:29:19.854Z

Link: CVE-2026-24069

cve-icon Vulnrichment

Updated: 2026-04-14T18:24:36.801Z

cve-icon NVD

Status : Received

Published: 2026-04-14T12:16:20.247

Modified: 2026-04-14T19:16:33.553

Link: CVE-2026-24069

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T15:30:06Z

Weaknesses