CVE-2026-32692

Source
https://cve.org/CVERecord?id=CVE-2026-32692
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-32692.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-32692
Aliases
Downstream
Related
Published
2026-03-18T13:16:18.710Z
Modified
2026-04-10T05:42:25.263117Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

An authorization bypass vulnerability in the Vault secrets back-end implementation of Juju versions 3.1.6 through 3.6.18 allows an authenticated unit agent to perform unauthorized updates to secret revisions. With sufficient information, an attacker can poison any existing secret revision within the scope of that Vault secret back-end.

References

Affected packages

Git / github.com/juju/juju

Affected ranges

Type
GIT
Repo
https://github.com/juju/juju
Events
Database specific
{
    "versions": [
        {
            "introduced": "3.1.6"
        },
        {
            "fixed": "3.6.19"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-32692.json"