Hedera Guardian through 3.5.1 contains an authentication bypass vulnerability in the GET /api/v1/demo/registered-users endpoint that allows unauthenticated attackers to retrieve sensitive user information. Attackers can access the endpoint without providing authentication credentials to obtain usernames, Hedera DIDs, parent registry DIDs, system roles, and policy role assignments for all registered users in the system.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 14 May 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hashgraph
Hashgraph guardian |
|
| Vendors & Products |
Hashgraph
Hashgraph guardian |
Thu, 14 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hedera Guardian through 3.5.1 contains an authentication bypass vulnerability in the GET /api/v1/demo/registered-users endpoint that allows unauthenticated attackers to retrieve sensitive user information. Attackers can access the endpoint without providing authentication credentials to obtain usernames, Hedera DIDs, parent registry DIDs, system roles, and policy role assignments for all registered users in the system. | |
| Title | Hedera Guardian Authentication Bypass Information Disclosure | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T21:36:22.995Z
Reserved: 2026-05-11T14:14:49.613Z
Link: CVE-2026-45248
No data.
Status : Received
Published: 2026-05-14T22:16:45.000
Modified: 2026-05-14T22:16:45.000
Link: CVE-2026-45248
No data.
OpenCVE Enrichment
Updated: 2026-05-14T22:30:25Z
Weaknesses