Loading
Generated remediation guidance and an executive summary. No account required.
Inadequate access control in the registration process in Fullstep V5, which could allow unauthenticated users to obtain a valid JWT token with which to interact with authenticated API resources. Successful exploitation of this vulnerability could allow an unauthenticated attacker to compromise the confidentiality of the affected resource, provided they have a valid token with which to interact with the API.
No affected products information available.
Use CWE-306 to widen CVE-2026-5749 into its surrounding weakness, vendor, and product context.