In Juju from version 3.0.0 through 3.6.18, the authorization of the "secret-set" tool is not performed correctly, which allows a grantee to update the secret content, and can lead to reading or updating other secrets. When the "secret-set" tool logs an error in an exploitation attempt, the secret is still updated contrary to expectations, and the new value is visible to both the owner and the grantee.
References
| Link | Resource |
|---|---|
| https://github.com/juju/juju/security/advisories/GHSA-439w-v2p7-pggc | Exploit Vendor Advisory |
Configurations
History
19 Mar 2026, 15:17
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Canonical
Canonical juju |
|
| CPE | cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:* | |
| References | () https://github.com/juju/juju/security/advisories/GHSA-439w-v2p7-pggc - Exploit, Vendor Advisory |
18 Mar 2026, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-18 13:16
Updated : 2026-03-19 15:17
NVD link : CVE-2026-32693
Mitre link : CVE-2026-32693
CVE.ORG link : CVE-2026-32693
JSON object : View
Products Affected
canonical
- juju
