Description
An authorization vulnerability exists in Innoshop 0.6.0. After logging into the frontend, an attacker can directly access backend application interfaces, leading to further dangerous operations.
Published: 2026-05-19
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an authorization flaw—specifically a missing or incorrect authorization check—that allows a user who has logged into the frontend to access backend application interfaces. This can lead to unauthorized execution of sensitive backend operations that may compromise the confidentiality, integrity, and availability of the system. The weakness is best described as CWE‑284, Improper Authorization.

Affected Systems

The issue affects the Innoshop e‑commerce platform, version 0.6.0. No other products or versions are listed as impacted. The vendor is Innoshop; the specific affected version is 0.6.0.

Risk and Exploitability

The CVSS score is 7.3, indicating a high severity risk. The EPSS score of <1% indicates a very low but nonzero exploitation probability, and the flaw is not listed in the CISA KEV catalog, indicating that publicly known exploitation is currently low or none. The likely attack vector is through a legitimate user login to the frontend, after which the attacker can request backend endpoints that bypass proper authorization checks; this inference is based on the stated requirement that an attacker must be logged in. An attacker does not need elevated privileges beyond those used to login, but the vulnerability permits the use of backend functions normally reserved for administrators. Because no exploit code has been documented, the risk remains theoretical until the vendor releases a fix.

Generated by OpenCVE AI on May 20, 2026 at 16:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Innoshop website or vendor portal for a release that addresses this vulnerability and deploy the update when available.
  • Add explicit authorization checks to all backend API endpoints so that only users with administrative privileges can access them, effectively enforcing role‑based access control.
  • Apply firewall or network segmentation rules to limit direct access to backend interfaces to trusted hosts or IP ranges, and monitor logs for unexpected calls to protected endpoints.

Generated by OpenCVE AI on May 20, 2026 at 16:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 16:45:00 +0000

Type Values Removed Values Added
Title Authorization Vulnerability Enabling Backend Access in Innoshop 0.6.0

Wed, 20 May 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Innoshop
Innoshop innoshop
Vendors & Products Innoshop
Innoshop innoshop

Tue, 19 May 2026 22:15:00 +0000

Type Values Removed Values Added
Title Authorization Vulnerability Enabling Backend Access in Innoshop 0.6.0
Weaknesses CWE-284

Tue, 19 May 2026 20:30:00 +0000

Type Values Removed Values Added
Description An authorization vulnerability exists in Innoshop 0.6.0. After logging into the frontend, an attacker can directly access backend application interfaces, leading to further dangerous operations.
References

Subscriptions

Innoshop Innoshop
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-20T13:52:15.489Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-39250

cve-icon Vulnrichment

Updated: 2026-05-20T13:52:11.537Z

cve-icon NVD

Status : Deferred

Published: 2026-05-19T21:16:42.863

Modified: 2026-05-20T14:25:17.977

Link: CVE-2026-39250

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T16:30:14Z

Weaknesses