CVE-2026-5774

Improper synchronization of the userTokens map in the API server in Canonical Juju 4.0.5, 3.6.20, and 2.9.56 may allow an authenticated user to possibly cause a denial of service on the server or possibly reuse a single-use discharge token.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*
cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*
cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*

History

22 Apr 2026, 20:46

Type Values Removed Values Added
First Time Canonical
Canonical juju
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.4
References () https://github.com/juju/juju/pull/22205 - () https://github.com/juju/juju/pull/22205 - Issue Tracking
References () https://github.com/juju/juju/pull/22206 - () https://github.com/juju/juju/pull/22206 - Issue Tracking
References () https://github.com/juju/juju/security/advisories/GHSA-7m55-2hr4-pw78 - () https://github.com/juju/juju/security/advisories/GHSA-7m55-2hr4-pw78 - Exploit, Third Party Advisory
CPE cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*

10 Apr 2026, 13:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-10 13:16

Updated : 2026-04-22 20:46


NVD link : CVE-2026-5774

Mitre link : CVE-2026-5774

CVE.ORG link : CVE-2026-5774


JSON object : View

Products Affected

canonical

  • juju
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')