No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 27 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Smythos
Smythos sre |
|
| Vendors & Products |
Smythos
Smythos sre |
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 26 Apr 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in SmythOS sre up to 0.0.15. Affected is the function AgentRuntime of the file packages/core/src/subsystems/AgentManager/AgentRuntime.class.ts of the component HTTP Header Handler. Such manipulation of the argument X-DEBUG-RUN/X-DEBUG-INJ leads to improper authentication. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | SmythOS sre HTTP Header AgentRuntime.class.ts AgentRuntime improper authentication | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-27T13:52:30.369Z
Reserved: 2026-04-25T13:52:25.805Z
Link: CVE-2026-7022
Updated: 2026-04-27T13:52:25.212Z
Status : Deferred
Published: 2026-04-26T06:16:02.210
Modified: 2026-04-27T18:48:02.293
Link: CVE-2026-7022
No data.
OpenCVE Enrichment
Updated: 2026-04-27T19:52:35Z