CVE-2026-22723 (GCVE-0-2026-22723)

Vulnerability from cvelistv5 – Published: 2026-03-05 20:40 – Updated: 2026-03-06 16:31
VLAI?
Title
UAA User Token Revocation logic error
Summary
Inappropriate user token revocation due to a logic error in the token revocation endpoint implementation in Cloudfoundry UAA v77.30.0 to v78.7.0 and in Cloudfoundry Deployment v48.7.0 to v54.10.0.
Assigner
Impacted products
Vendor Product Version
Cloudfoundry Foundation UAA Affected: 77.30.0 , ≤ v78.7.0 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-22723",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-06T16:31:29.833923Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-06T16:31:36.817Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UAA",
          "vendor": "Cloudfoundry Foundation",
          "versions": [
            {
              "lessThanOrEqual": "v78.7.0",
              "status": "affected",
              "version": "77.30.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eInappropriate user token revocation \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003edue to a logic error in the token revocation endpoint implementation\u0026nbsp;\u003c/span\u003ein Cloudfoundry UAA v77.30.0 to v78.7.0 and in Cloudfoundry Deployment\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ev48.7.0 to v54.10.0.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "Inappropriate user token revocation due to a logic error in the token revocation endpoint implementation\u00a0in Cloudfoundry UAA v77.30.0 to v78.7.0 and in Cloudfoundry Deployment\u00a0v48.7.0 to v54.10.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-05T20:40:27.743Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.cloudfoundry.org/blog/cve-2026-22723-uaa-user-token-revocation/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "UAA User Token Revocation logic error",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2026-22723",
    "datePublished": "2026-03-05T20:40:27.743Z",
    "dateReserved": "2026-01-09T06:54:36.841Z",
    "dateUpdated": "2026-03-06T16:31:36.817Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-22723\",\"sourceIdentifier\":\"security@vmware.com\",\"published\":\"2026-03-05T21:16:14.610\",\"lastModified\":\"2026-03-17T18:35:29.637\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Inappropriate user token revocation due to a logic error in the token revocation endpoint implementation\u00a0in Cloudfoundry UAA v77.30.0 to v78.7.0 and in Cloudfoundry Deployment\u00a0v48.7.0 to v54.10.0.\"},{\"lang\":\"es\",\"value\":\"Revocaci\u00f3n inapropiada de tokens de usuario debido a un error de l\u00f3gica en la implementaci\u00f3n del endpoint de revocaci\u00f3n de tokens en Cloudfoundry UAA v77.30.0 a v78.7.0 y en Cloudfoundry Deployment v48.7.0 a v54.10.0.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@vmware.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*\",\"versionStartExcluding\":\"48.7.0\",\"versionEndIncluding\":\"54.11.0\",\"matchCriteriaId\":\"C829FC80-C988-46CB-BD70-D6EBAA93705A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudfoundry:uaa-release:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"77.30.0\",\"versionEndExcluding\":\"78.8.0\",\"matchCriteriaId\":\"E19811F2-0608-4471-A951-2A51A8B8974D\"}]}]}],\"references\":[{\"url\":\"https://www.cloudfoundry.org/blog/cve-2026-22723-uaa-user-token-revocation/\",\"source\":\"security@vmware.com\",\"tags\":[\"Vendor Advisory\",\"Mitigation\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-22723\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-06T16:31:29.833923Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-06T16:31:33.348Z\"}}], \"cna\": {\"title\": \"UAA User Token Revocation logic error\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Cloudfoundry Foundation\", \"product\": \"UAA\", \"versions\": [{\"status\": \"affected\", \"version\": \"77.30.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"v78.7.0\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.cloudfoundry.org/blog/cve-2026-22723-uaa-user-token-revocation/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.5.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Inappropriate user token revocation due to a logic error in the token revocation endpoint implementation\\u00a0in Cloudfoundry UAA v77.30.0 to v78.7.0 and in Cloudfoundry Deployment\\u00a0v48.7.0 to v54.10.0.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eInappropriate user token revocation \u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003edue to a logic error in the token revocation endpoint implementation\u0026nbsp;\u003c/span\u003ein Cloudfoundry UAA v77.30.0 to v78.7.0 and in Cloudfoundry Deployment\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003ev48.7.0 to v54.10.0.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"shortName\": \"vmware\", \"dateUpdated\": \"2026-03-05T20:40:27.743Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2026-22723\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-06T16:31:36.817Z\", \"dateReserved\": \"2026-01-09T06:54:36.841Z\", \"assignerOrgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"datePublished\": \"2026-03-05T20:40:27.743Z\", \"assignerShortName\": \"vmware\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…