CVE-2026-42303

Published: Mag 12, 2026 Last Modified: Mag 12, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,1
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: active
Confidentiality: N/A
Integrity: N/A
Availability: N/A

Description

AI Translation Available

Fides is an open-source privacy engineering platform. From 2.75.0 to before 2.83.2, Fides deployments that enable both subject identity verification and duplicate privacy request detection are affected by a vulnerability in which an administrator can approve a privacy request whose identity was never verified. For erasure policies, this can result in unauthorized deletion of a data subject's records across every integration configured in the affected deployment. This vulnerability is fixed in 2.83.2.

288

Authentication Bypass Using an Alternate Path or Channel

Incomplete
Common Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Bypass Protection Mechanism
Applicable Platforms
Technologies: Not Technology-Specific, Web Based
View CWE Details
306

Missing Authentication for Critical Function

Draft
Common Consequences
Security Scopes Affected:
Access Control Other
Potential Impacts:
Gain Privileges Or Assume Identity Varies By Context
Applicable Platforms
Technologies: Cloud Computing, ICS/OT
View CWE Details
841

Improper Enforcement of Behavioral Workflow

Incomplete
Common Consequences
Security Scopes Affected:
Other
Potential Impacts:
Alter Execution Logic
Applicable Platforms
All platforms may be affected
View CWE Details
https://github.com/ethyca/fides/security/advisories/GHSA-qx5f-ghc2-7g5c
https://github.com/ethyca/fides/commit/0e320b20934eb5af3a3d5127dba2691605d7ff37
https://github.com/ethyca/fides/commit/e7a6527b0f9fdc9887b86a89bb5453e7421882dd
https://github.com/ethyca/fides/pull/7971
https://github.com/ethyca/fides/pull/7972
https://github.com/ethyca/fides/releases/tag/2.83.2
https://github.com/ethyca/fides/security/advisories/GHSA-qx5f-ghc2-7g5c