{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-32716/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":8.1,"id":"CVE-2026-32716"}],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["authorization-bypass","scitokens","CVE-2026-32716"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eSciTokens is a reference library for generating and using SciTokens. Versions prior to 1.9.6 are vulnerable to an authorization bypass. The vulnerability, identified as CVE-2026-32716, stems from incorrect validation of scope paths within the Enforcer component. Instead of performing an exact match, the Enforcer uses a simple prefix match (startswith). This flaw allows a token authorized for a specific path (e.g., \u003ccode\u003e/john\u003c/code\u003e) to also gain unauthorized access to sibling paths sharing the same…\u003c/p\u003e\n","date_modified":"2026-03-31T03:17:16Z","date_published":"2026-03-31T03:17:16Z","id":"/briefs/2026-04-scitokens-auth-bypass/","summary":"SciTokens versions prior to 1.9.6 incorrectly validate scope paths using a prefix match, leading to an authorization bypass vulnerability where a token with access to a specific path can access sibling paths with the same prefix.","title":"SciTokens Authorization Bypass Vulnerability (CVE-2026-32716)","url":"https://feed.craftedsignal.io/briefs/2026-04-scitokens-auth-bypass/"}],"language":"en","title":"CraftedSignal Threat Feed — CVE-2026-32716","version":"https://jsonfeed.org/version/1.1"}