Impact
Fullstep V5 contains an inadequate access control flaw that allows an unauthenticated user to register and receive a valid JSON Web Token (JWT). With this token the attacker can invoke authenticated API endpoints, thereby accessing protected resources and potentially exposing sensitive data. The vulnerability aligns with CWE‑306, improper authorization.
Affected Systems
Fullstep’s main product, versions 5.x prior to 5.30.07, are affected. The Fixed version 5.30.07, released on January 29, 2026, addresses the issue.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity. EPSS information is not available, so the exploitation probability is unknown. The vulnerability is not listed in CISA’s KEV catalog. A likely attack path involves a remote web request to the registration endpoint, enabling token acquisition without authentication. Once a token is obtained, the attacker can access otherwise protected API resources, potentially compromising confidentiality of the data exposed by those endpoints.
OpenCVE Enrichment