2026-04-24 8:28CVE-2026-6272eclipse
PUBLISHED5.2CWE-306

A client holding only a read JWT scope can still register itself as a signal provider through the production kuksa.val.v2 OpenProviderStream API by sending ProvideSignalRequest.

1. Obtain any valid token with only read scope.

2. Connect to the normal production gRPC API (kuksa.val.v2).

3. Open OpenProviderStream.

4. Send ProvideSignalRequest for a target signal ID.

5. Wait for the broker to forward GetProviderValueRequest.

6. Reply with attacker-controlled GetProviderValueResponse.

7. Other clients performing GetValue / GetValues for that signal receive forged data.

Problem type

Affected products

Eclipse Foundation

Eclipse KUKSA - Databroker

<= 0.6.0 - AFFECTED

References

GitHub Security Advisories

GHSA-66v8-c34p-jmrm

A client holding only a read JWT scope can still register itself as a signal provider through the...

https://github.com/advisories/GHSA-66v8-c34p-jmrm

A client holding only a read JWT scope can still register itself as a signal provider through the production kuksa.val.v2 OpenProviderStream API by sending ProvideSignalRequest.

  1. Obtain any valid token with only read scope.
  2. Connect to the normal production gRPC API (kuksa.val.v2).
  3. Open OpenProviderStream.
  4. Send ProvideSignalRequest for a target signal ID.
  5. Wait for the broker to forward GetProviderValueRequest.
  6. Reply with attacker-controlled GetProviderValueResponse.
  7. Other clients performing GetValue / GetValues for that signal receive forged data.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-6272
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-6272",
    "assignerOrgId": "e51fbebd-6053-4e49-959f-1b94eeb69a2c",
    "assignerShortName": "eclipse",
    "dateUpdated": "2026-04-24T08:28:17.690Z",
    "dateReserved": "2026-04-14T12:57:50.655Z",
    "datePublished": "2026-04-24T08:28:17.690Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "e51fbebd-6053-4e49-959f-1b94eeb69a2c",
        "shortName": "eclipse",
        "dateUpdated": "2026-04-24T08:28:17.690Z"
      },
      "descriptions": [
        {
          "lang": "en",
          "value": "A client holding only a read JWT scope can still register itself as a signal provider through the production kuksa.val.v2 OpenProviderStream API by sending ProvideSignalRequest.\n\n1. Obtain any valid token with only read scope.\n2. Connect to the normal production gRPC API (kuksa.val.v2).\n3. Open OpenProviderStream.\n4. Send ProvideSignalRequest for a target signal ID.\n5. Wait for the broker to forward GetProviderValueRequest.\n6. Reply with attacker-controlled GetProviderValueResponse.\n7. Other clients performing GetValue / GetValues for that signal receive forged data.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "A client holding only a read JWT scope can still register itself as a signal provider through the production kuksa.val.v2 OpenProviderStream API by sending ProvideSignalRequest.<br><br>1. Obtain any valid token with only read scope.<br>2. Connect to the normal production gRPC API (kuksa.val.v2).<br>3. Open OpenProviderStream.<br>4. Send ProvideSignalRequest for a target signal ID.<br>5. Wait for the broker to forward GetProviderValueRequest.<br>6. Reply with attacker-controlled GetProviderValueResponse.<br>7. Other clients performing GetValue / GetValues for that signal receive forged data."
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "Eclipse Foundation",
          "product": "Eclipse KUKSA - Databroker",
          "repo": "https://github.com/eclipse-kuksa/kuksa-databroker",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "0.5.0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "0.6.0"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-306: Missing Authentication for Critical Function",
              "cweId": "CWE-306",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://gitlab.eclipse.org/security/cve-assignment/-/issues/98"
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Ciwan Öztopal",
          "type": "finder"
        }
      ]
    }
  }
}