Description
A vulnerability was determined in OWAP DefectDojo up to 2.55.4. Affected by this vulnerability is an unknown functionality of the component Benchmark/Engagement/Product/Survey. Executing a manipulation can lead to authorization bypass. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.56.0 addresses this issue. This patch is called eb6120a379185d37eb1af17b69bb5614a830ab1f. Upgrading the affected component is recommended.
Published: 2026-04-30
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An unauthorized access flaw exists in the Benchmark/Engagement/Product/Survey component of OWAP DefectDojo versions through 2.55.4. The flaw stems from an unknown functionality that can be manipulated remotely, allowing an attacker to bypass normal authorization checks. The vulnerability aligns with CWE‑285 (Incorrect Authorization) and CWE‑639 (Privilege Escalation), meaning an attacker who can exploit it gains higher privileges and can perform actions they should not be permitted to. The description explicitly states that the exploit has been publicly disclosed and may be used.

Affected Systems

The affected vendor is OWAP:DefectDojo. Users running DefectDojo 2.55.4 or earlier are impacted. Upgrading to version 2.56.0 removes the flaw. No other affected versions are listed in the CVE data.

Risk and Exploitability

The CVSS score is 5.3, indicating moderate severity. EPSS is not available, but the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, with no local or physical access prerequisites. An attacker who crafts the appropriate manipulation can directly reach the component and bypass authorization, which could lead to unauthorized data access or modification on the impacted systems.

Generated by OpenCVE AI on May 1, 2026 at 04:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the DefectDojo 2.56.0 patch or later immediately.
  • Reduce the attack surface by disabling or restricting access to Benchmark/Engagement/Product/Survey endpoints for users who do not require them.
  • Review and tighten role‑based access controls to ensure that only privileged users can perform actions on the affected components.

Generated by OpenCVE AI on May 1, 2026 at 04:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 01 May 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Owasp
Owasp defectdojo
Vendors & Products Owasp
Owasp defectdojo

Thu, 30 Apr 2026 23:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in OWAP DefectDojo up to 2.55.4. Affected by this vulnerability is an unknown functionality of the component Benchmark/Engagement/Product/Survey. Executing a manipulation can lead to authorization bypass. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.56.0 addresses this issue. This patch is called eb6120a379185d37eb1af17b69bb5614a830ab1f. Upgrading the affected component is recommended.
Title OWAP DefectDojo Benchmark/Engagement/Product/Survey authorization
Weaknesses CWE-285
CWE-639
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Owasp Defectdojo
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-01T19:30:20.129Z

Reserved: 2026-04-30T15:16:54.770Z

Link: CVE-2026-7510

cve-icon Vulnrichment

Updated: 2026-05-01T16:06:46.719Z

cve-icon NVD

Status : Deferred

Published: 2026-04-30T23:16:21.300

Modified: 2026-05-01T15:26:24.553

Link: CVE-2026-7510

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T08:15:12Z

Weaknesses