Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-2409
PUBLISHED
More InfoOfficial Page
Assigner-Delinea
Assigner Org ID-1443cd92-d354-46d2-9290-d812316ca43a
View Known Exploited Vulnerability (KEV) details
Published At-19 Feb, 2026 | 17:55
Updated At-19 Feb, 2026 | 17:55
Rejected At-
▼CVE Numbering Authority (CNA)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Delinea Cloud Suite allows Argument Injection.This issue affects Cloud Suite: before 25.2 HF1.

Affected Products
Vendor
Delinea
Product
Cloud Suite
Default Status
unaffected
Versions
Affected
  • From 0 before 25.2 HF1 (custom)
Unaffected
  • 25.2 HF1 or later
Problem Types
TypeCWE IDDescription
CWECWE-89CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Type: CWE
CWE ID: CWE-89
Description: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Metrics
VersionBase scoreBase severityVector
4.09.3CRITICAL
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
Version: 4.0
Base score: 9.3
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-6CAPEC-6 Argument Injection
CAPEC ID: CAPEC-6
Description: CAPEC-6 Argument Injection
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Jess Parker (jparker@calottery.com)
finder
Radu Enachi (renachi@calottery.com)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.delinea.com/online-help/cloud-suite/release-notes/cloud-suite/25.2.htm#Resolved
N/A
https://delinea.com/security-advisories
N/A
Hyperlink: https://docs.delinea.com/online-help/cloud-suite/release-notes/cloud-suite/25.2.htm#Resolved
Resource: N/A
Hyperlink: https://delinea.com/security-advisories
Resource: N/A
Details not found