TopVuln

High-risk vulnerability digests

CVE-2026-6508

  • CRITICAL

Details

CVSS v3
9.8
NVD published
2026-05-07 12:16:18
EPSS
<0.1% probability · 5.6th percentile — 2026-05-11
Affected versions
Liderahenk 2.0.1 to before 2.0.2
Summary
This vulnerability allows attackers to bypass ACL constraints and access unauthorized functionality in Liderahenk. Unauthenticated remote attackers can exploit this flaw to gain access to sensitive system resources. No public exploitation has been reported as of publication.
Remediation
Upgrade Liderahenk to version 2.0.2 or later immediately. Restrict public network access to Liderahenk management interfaces until patching is complete. Audit access logs for unauthorized activity after patching.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.