Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-42303
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-12 May, 2026 | 17:29
Updated At-12 May, 2026 | 18:40
Rejected At-
▼CVE Numbering Authority (CNA)
Fides: Privacy Request Identity Verification Bypass Vulnerability via Duplicate Detection

Fides is an open-source privacy engineering platform. From 2.75.0 to before 2.83.2, Fides deployments that enable both subject identity verification and duplicate privacy request detection are affected by a vulnerability in which an administrator can approve a privacy request whose identity was never verified. For erasure policies, this can result in unauthorized deletion of a data subject's records across every integration configured in the affected deployment. This vulnerability is fixed in 2.83.2.

Affected Products
Vendor
ethyca
Product
fides
Versions
Affected
  • >= 2.75.0, < 2.83.2
Problem Types
TypeCWE IDDescription
CWECWE-288CWE-288: Authentication Bypass Using an Alternate Path or Channel
CWECWE-306CWE-306: Missing Authentication for Critical Function
CWECWE-841CWE-841: Improper Enforcement of Behavioral Workflow
Type: CWE
CWE ID: CWE-288
Description: CWE-288: Authentication Bypass Using an Alternate Path or Channel
Type: CWE
CWE ID: CWE-306
Description: CWE-306: Missing Authentication for Critical Function
Type: CWE
CWE ID: CWE-841
Description: CWE-841: Improper Enforcement of Behavioral Workflow
Metrics
VersionBase scoreBase severityVector
4.06.1MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:H/SA:N
Version: 4.0
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:H/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/ethyca/fides/security/advisories/GHSA-qx5f-ghc2-7g5c
x_refsource_CONFIRM
https://github.com/ethyca/fides/pull/7971
x_refsource_MISC
https://github.com/ethyca/fides/pull/7972
x_refsource_MISC
https://github.com/ethyca/fides/commit/0e320b20934eb5af3a3d5127dba2691605d7ff37
x_refsource_MISC
https://github.com/ethyca/fides/commit/e7a6527b0f9fdc9887b86a89bb5453e7421882dd
x_refsource_MISC
https://github.com/ethyca/fides/releases/tag/2.83.2
x_refsource_MISC
Hyperlink: https://github.com/ethyca/fides/security/advisories/GHSA-qx5f-ghc2-7g5c
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/ethyca/fides/pull/7971
Resource:
x_refsource_MISC
Hyperlink: https://github.com/ethyca/fides/pull/7972
Resource:
x_refsource_MISC
Hyperlink: https://github.com/ethyca/fides/commit/0e320b20934eb5af3a3d5127dba2691605d7ff37
Resource:
x_refsource_MISC
Hyperlink: https://github.com/ethyca/fides/commit/e7a6527b0f9fdc9887b86a89bb5453e7421882dd
Resource:
x_refsource_MISC
Hyperlink: https://github.com/ethyca/fides/releases/tag/2.83.2
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/ethyca/fides/security/advisories/GHSA-qx5f-ghc2-7g5c
exploit
Hyperlink: https://github.com/ethyca/fides/security/advisories/GHSA-qx5f-ghc2-7g5c
Resource:
exploit
Details not found