CVE-2026-9152
Description
A missing authentication vulnerability exists in the Altium 365 SearchService. A legacy SOAP endpoint exposes search index operations without requiring authentication, session tokens, or any form of identity verification. An unauthenticated network attacker who can reference a target workspace's identifier can interact with that workspace's search index, crossing tenant boundaries.
Successful exploitation allows reading a workspace's indexed contents (such as component data, project and folder names, and user metadata) and injecting, modifying, or deleting search index entries. These operations affect the search index only, not the underlying vault data, but they can disclose sensitive workspace information and compromise the integrity and availability of search results. Altium 365 cloud deployments are affected; on-premise Altium Enterprise Server is not affected.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unauthenticated SOAP endpoint in Altium 365 SearchService allows cross-tenant search index read/write operations, leading to information disclosure and integrity compromise.
Vulnerability
A missing authentication vulnerability exists in the Altium 365 SearchService. A legacy SOAP endpoint exposes search index operations without requiring authentication, session tokens, or any form of identity verification. Affected versions include all Altium 365 cloud deployments; on-premise Altium Enterprise Server is not affected. An attacker who can reference a target workspace's identifier can interact with that workspace's search index, crossing tenant boundaries [1].
Exploitation
An unauthenticated network attacker can exploit this vulnerability by sending SOAP requests to the vulnerable endpoint. The attacker must know a valid workspace identifier (which may be guessable or obtainable through other means). No authentication or user interaction is required. The attacker can then read, inject, modify, or delete search index entries by crafting appropriate requests [1].
Impact
Successful exploitation allows the attacker to read a workspace's indexed contents, including component data, project and folder names, and user metadata, leading to information disclosure. Additionally, the attacker can inject, modify, or delete search index entries, compromising the integrity and availability of search results. These operations affect the search index only, not the underlying vault data, but can still disclose sensitive information and degrade the user experience [1].
Mitigation
As of the publication date, Altium has not publicly disclosed a fixed version for this vulnerability in the available references. Affected deployments should monitor the Altium security advisories page [1] for updates. Network segmentation and restricting access to the SOAP endpoint may serve as temporary workarounds until a patch is released.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.