Description
Origin Validation Error vulnerability in TUBITAK BILGEM Software Technologies Research Institute Liderahenk allows Accessing Functionality Not Properly Constrained by ACLs.

This issue affects Liderahenk: from 2.0.1 before 2.0.2.
Published: 2026-05-07
Score: 9.8 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is an origin validation error in TUBITAK BILGEM Liderahenk. The system fails to verify that requests originate from trusted sources and therefore permits access to functionality that should be protected by role‑based ACLs. Attackers can manipulate the Origin header or craft requests that bypass the expected origin check, gaining unauthorized access to privileged operations. Adversaries could then execute code, leak sensitive data, or modify configuration, effectively compromising the application’s confidentiality, integrity, and availability.

Affected Systems

The flaw affects Liderahenk versions from 2.0.1 up to, but not including, 2.0.2. All installations of the software released before 2.0.2 are vulnerable. This includes deployments used in Turkish government or enterprise environments where the Liderahenk platform is employed.

Risk and Exploitability

The CVSS base score of 9.8 and the lack of available EPSS data mean that the vulnerability is considered critical, but the actual exploitation probability cannot be quantified. It is not listed in the CISA KEV catalog. The attack vector is inferred to be network‑based since origin validation is typically enforced over HTTP/S requests, and the design flaw removes an essential security boundary. Exploitation requires only that an attacker can send crafted HTTP requests to the vulnerable instance, making it highly exploitable in environments where the software is exposed to the internet or an untrusted network.

Generated by OpenCVE AI on May 7, 2026 at 14:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Liderahenk to version 2.0.2 or later, which includes a fix for the origin validation flaw.
  • Enforce strict Origin or Referer checks on the web server or application layer, rejecting requests that do not match the expected host or scheme.
  • Review and enforce ACLs for all privileged endpoints, ensuring that only authenticated and authorized users can invoke protected functionality.
  • Apply network segmentation or firewall rules to limit external access to services that do not need to be exposed to the public internet.

Generated by OpenCVE AI on May 7, 2026 at 14:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Tubitak Bilgem Software Technologies Research Institute
Tubitak Bilgem Software Technologies Research Institute liderahenk
Vendors & Products Tubitak Bilgem Software Technologies Research Institute
Tubitak Bilgem Software Technologies Research Institute liderahenk
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 07 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description Origin Validation Error vulnerability in TUBITAK BILGEM Software Technologies Research Institute Liderahenk allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Liderahenk: from 2.0.1 before 2.0.2.
Title RCE in TUBITAK BILGEM's Liderahenk
Weaknesses CWE-346
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Tubitak Bilgem Software Technologies Research Institute Liderahenk
cve-icon MITRE

Status: PUBLISHED

Assigner: TR-CERT

Published:

Updated: 2026-05-07T14:57:31.925Z

Reserved: 2026-04-17T11:32:23.375Z

Link: CVE-2026-6508

cve-icon Vulnrichment

Updated: 2026-05-07T14:46:59.209Z

cve-icon NVD

Status : Deferred

Published: 2026-05-07T12:16:18.330

Modified: 2026-05-07T14:42:56.070

Link: CVE-2026-6508

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T15:00:13Z

Weaknesses