An insecure direct object reference (IDOR) vulnerability in the Fullstep V5 registration process allows authenticated users to access data belonging to other registered users through various vulnerable authenticated resources in the application. The vulnerable endpoints result from: '/api/suppliers/v1/suppliers//false' to list user information; and '/#/supplier-registration/supplier-registration//2' to update your user information (personal details, documents, etc.).

Project Subscriptions

Vendors Products
Fullstep Subscribe
Fullstep Subscribe
Advisories

No advisories yet.

Fixes

Solution

The vulnerability has been fixed by the Fullstep team in version 5.30.07, which has been available in production since January 29, 2026.


Workaround

No workaround given by the vendor.

History

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description An insecure direct object reference (IDOR) vulnerability in the Fullstep V5 registration process allows authenticated users to access data belonging to other registered users through various vulnerable authenticated resources in the application. The vulnerable endpoints result from: '/api/suppliers/v1/suppliers//false' to list user information; and '/#/supplier-registration/supplier-registration//2' to update your user information (personal details, documents, etc.).
Title Insecure direct object reference (IDOR) vulnerability in Fullstep
First Time appeared Fullstep
Fullstep fullstep
Weaknesses CWE-639
CPEs cpe:2.3:a:fullstep:fullstep:5.30.07:*:*:*:*:*:*:*
cpe:2.3:a:fullstep:fullstep:5:*:*:*:*:*:*:*
Vendors & Products Fullstep
Fullstep fullstep
References
Metrics cvssV4_0

{'score': 7.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2026-04-22T13:59:00.643Z

Reserved: 2026-04-07T15:31:15.848Z

Link: CVE-2026-5750

cve-icon Vulnrichment

Updated: 2026-04-22T13:58:50.503Z

cve-icon NVD

Status : Received

Published: 2026-04-22T14:17:06.173

Modified: 2026-04-22T14:17:06.173

Link: CVE-2026-5750

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses