-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from missing user identity validation in private tenant access checks. The commit diff shows a critical addition: 'if (isUserPrivateTenant(user)) { return access.contains("$USER_TAG${user.name}") }'. This indicates the original code (pre-2.14) lacked this user-specific check, allowing any tenant member with RBAC privileges to access resources by ID without ownership validation. The UserAccessManager.kt modification directly addresses the CWE-639 scenario where user-controlled resource IDs could bypass authorization when tenant checks alone were insufficient.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.opensearch.plugin:opensearch-reports-scheduler | maven | < 2.14.0.0 | 2.14.0.0 |
KEV Misses 88% of Exploited CVEs- Get the report