Vulnerability Details CVE-2026-32693
In Juju from version 3.0.0 through 3.6.18, the authorization of the "secret-set" tool is not performed correctly, which allows a grantee to update the secret content, and can lead to reading or updating other secrets. When the "secret-set" tool logs an error in an exploitation attempt, the secret is still updated contrary to expectations, and the new value is visible to both the owner and the grantee.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 15.7%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2026-32693
-
cpe:2.3:a:canonical:juju:3.1
-
cpe:2.3:a:canonical:juju:3.1.0
-
cpe:2.3:a:canonical:juju:3.1.1
-
cpe:2.3:a:canonical:juju:3.1.10
-
cpe:2.3:a:canonical:juju:3.1.2
-
cpe:2.3:a:canonical:juju:3.1.3
-
cpe:2.3:a:canonical:juju:3.1.4
-
cpe:2.3:a:canonical:juju:3.1.5
-
cpe:2.3:a:canonical:juju:3.1.6
-
cpe:2.3:a:canonical:juju:3.1.7
-
cpe:2.3:a:canonical:juju:3.1.8
-
cpe:2.3:a:canonical:juju:3.1.9
-
cpe:2.3:a:canonical:juju:3.2
-
cpe:2.3:a:canonical:juju:3.3
-
cpe:2.3:a:canonical:juju:3.3.0
-
cpe:2.3:a:canonical:juju:3.3.1
-
cpe:2.3:a:canonical:juju:3.3.2
-
cpe:2.3:a:canonical:juju:3.3.3
-
cpe:2.3:a:canonical:juju:3.3.4
-
cpe:2.3:a:canonical:juju:3.3.5
-
cpe:2.3:a:canonical:juju:3.3.6
-
cpe:2.3:a:canonical:juju:3.3.7
-
cpe:2.3:a:canonical:juju:3.4
-
cpe:2.3:a:canonical:juju:3.4.1
-
cpe:2.3:a:canonical:juju:3.4.2
-
cpe:2.3:a:canonical:juju:3.4.3
-
cpe:2.3:a:canonical:juju:3.4.4
-
cpe:2.3:a:canonical:juju:3.4.5
-
cpe:2.3:a:canonical:juju:3.4.6
-
cpe:2.3:a:canonical:juju:3.5
-
cpe:2.3:a:canonical:juju:3.5.0
-
cpe:2.3:a:canonical:juju:3.5.1
-
cpe:2.3:a:canonical:juju:3.5.2
-
cpe:2.3:a:canonical:juju:3.5.3
-
cpe:2.3:a:canonical:juju:3.5.4
-
cpe:2.3:a:canonical:juju:3.5.5
-
cpe:2.3:a:canonical:juju:3.5.6
-
cpe:2.3:a:canonical:juju:3.5.7
-
cpe:2.3:a:canonical:juju:3.6