[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-5412":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-10T20:12:16.648Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":88,"aliases":89,"duplicate_of":9,"upstream":90,"downstream":91,"duplicates":92,"related":93,"reserved_at":9,"published_at":94,"modified_at":95,"state":96,"summary":97,"references_raw":104,"kevs":122,"epss":9,"epss_history":123,"metrics":124,"affected":132},"CVE-2026-5412","In Juju versions prior to 2.9.57 and 3.6.21, an authorization issue exists in the Controller facade. An authenticated user can call the CloudSpec API method to extract the cloud credentials used to bootstrap the controller. This allows a low-privileged user to access sensitive credentials. This issue is resolved in Juju versions 2.9.57 and 3.6.21.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-285","Improper Authorization","The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.","weakness","Draft","Class","High",[20,24,28,32,36,40,44,48,52,56,60,64,68,72,76,80,84],{"id":21,"name":22,"techniques":23},"CAPEC-1","Accessing Functionality Not Properly Constrained by ACLs",[],{"id":25,"name":26,"techniques":27},"CAPEC-104","Cross Zone Scripting",[],{"id":29,"name":30,"techniques":31},"CAPEC-127","Directory Indexing",[],{"id":33,"name":34,"techniques":35},"CAPEC-13","Subverting Environment Variable Values",[],{"id":37,"name":38,"techniques":39},"CAPEC-17","Using Malicious Files",[],{"id":41,"name":42,"techniques":43},"CAPEC-39","Manipulating Opaque Client-based Data Tokens",[],{"id":45,"name":46,"techniques":47},"CAPEC-402","Bypassing ATA Password Security",[],{"id":49,"name":50,"techniques":51},"CAPEC-45","Buffer Overflow via Symbolic Links",[],{"id":53,"name":54,"techniques":55},"CAPEC-5","Blue Boxing",[],{"id":57,"name":58,"techniques":59},"CAPEC-51","Poison Web Service Registry",[],{"id":61,"name":62,"techniques":63},"CAPEC-59","Session Credential Falsification through Prediction",[],{"id":65,"name":66,"techniques":67},"CAPEC-60","Reusing Session IDs (aka Session Replay)",[],{"id":69,"name":70,"techniques":71},"CAPEC-647","Collect Data from Registries",[],{"id":73,"name":74,"techniques":75},"CAPEC-668","Key Negotiation of Bluetooth Attack (KNOB)",[],{"id":77,"name":78,"techniques":79},"CAPEC-76","Manipulating Web Input to File System Calls",[],{"id":81,"name":82,"techniques":83},"CAPEC-77","Manipulating User-Controlled Variables",[],{"id":85,"name":86,"techniques":87},"CAPEC-87","Forceful Browsing",[],[],[],[],[],[],[],"2026-04-10T12:22:05.403Z","2026-04-10T14:04:30.155Z","Received",{"cisa_kev":98,"cisa_ransomware":98,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":99,"severity_score":100,"severity_version":101,"severity_source":102,"severity_vector":103,"severity_status":96},false,"critical",9.9,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",[105,112,118],{"url":106,"sources":107,"tags":109},"https://github.com/juju/juju/security/advisories/GHSA-w5fq-8965-c969",[102,108],"nvd",[110,111],"VDB Entry","Vendor Advisory",{"url":113,"sources":114,"tags":115},"https://github.com/juju/juju/pull/22206",[102,108],[116,117],"Patch","Issue Tracking",{"url":119,"sources":120,"tags":121},"https://github.com/juju/juju/pull/22205",[102,108],[116,117],[],[],[125,130],{"source":102,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":126,"cvss_v4_0":9},{"baseScore":100,"baseSeverity":127,"vectorString":103,"impactScore":128,"exploitabilityScore":129},"CRITICAL",10,7.9,{"source":108,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":131,"cvss_v4_0":9},{"baseScore":100,"baseSeverity":127,"vectorString":103,"impactScore":128,"exploitabilityScore":129},[133],{"ecosystem":9,"name":134,"vendor":135,"product":136,"cpe_part":137,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":138},"Juju","canonical","juju","a",[139,146],{"version":140,"is_range":141,"range_type":102,"version_start":142,"version_start_type":143,"version_end":144,"version_end_type":145,"fixed_in":9},">= 2.9.0, \u003C 2.9.57",true,"2.9.0","including","2.9.57","excluding",{"version":147,"is_range":141,"range_type":102,"version_start":148,"version_start_type":143,"version_end":149,"version_end_type":145,"fixed_in":9},">= 3.6.0, \u003C 3.6.21","3.6.0","3.6.21"]