An issue in the login mechanism of Kaleris YMS v7.2.2.1 allows attackers to bypass login verification to access the application 's resources.
References
| Link | Resource |
|---|---|
| https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2026-31151 | Exploit Third Party Advisory |
| https://kaleris.com/solutions/yard-management/ | Product |
Configurations
History
10 Apr 2026, 18:02
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Kaleris
Kaleris yard Management Solutions |
|
| CPE | cpe:2.3:a:kaleris:yard_management_solutions:7.2.2.1:*:*:*:*:*:*:* | |
| References | () https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2026-31151 - Exploit, Third Party Advisory | |
| References | () https://kaleris.com/solutions/yard-management/ - Product |
07 Apr 2026, 15:17
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CWE | CWE-288 |
06 Apr 2026, 15:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-06 15:17
Updated : 2026-04-10 18:02
NVD link : CVE-2026-31151
Mitre link : CVE-2026-31151
CVE.ORG link : CVE-2026-31151
JSON object : View
Products Affected
kaleris
- yard_management_solutions
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel
