VYPR
Critical severityNVD Advisory· Published May 21, 2026

CVE-2026-9152

CVE-2026-9152

Description

A missing authentication vulnerability exists in the Altium 365 SearchService. A legacy SOAP endpoint exposes search index operations without requiring authentication, session tokens, or any form of identity verification. An unauthenticated network attacker who can reference a target workspace's identifier can interact with that workspace's search index, crossing tenant boundaries.

Successful exploitation allows reading a workspace's indexed contents (such as component data, project and folder names, and user metadata) and injecting, modifying, or deleting search index entries. These operations affect the search index only, not the underlying vault data, but they can disclose sensitive workspace information and compromise the integrity and availability of search results. Altium 365 cloud deployments are affected; on-premise Altium Enterprise Server is not affected.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unauthenticated SOAP endpoint in Altium 365 SearchService allows cross-tenant search index read/write operations, leading to information disclosure and integrity compromise.

Vulnerability

A missing authentication vulnerability exists in the Altium 365 SearchService. A legacy SOAP endpoint exposes search index operations without requiring authentication, session tokens, or any form of identity verification. Affected versions include all Altium 365 cloud deployments; on-premise Altium Enterprise Server is not affected. An attacker who can reference a target workspace's identifier can interact with that workspace's search index, crossing tenant boundaries [1].

Exploitation

An unauthenticated network attacker can exploit this vulnerability by sending SOAP requests to the vulnerable endpoint. The attacker must know a valid workspace identifier (which may be guessable or obtainable through other means). No authentication or user interaction is required. The attacker can then read, inject, modify, or delete search index entries by crafting appropriate requests [1].

Impact

Successful exploitation allows the attacker to read a workspace's indexed contents, including component data, project and folder names, and user metadata, leading to information disclosure. Additionally, the attacker can inject, modify, or delete search index entries, compromising the integrity and availability of search results. These operations affect the search index only, not the underlying vault data, but can still disclose sensitive information and degrade the user experience [1].

Mitigation

As of the publication date, Altium has not publicly disclosed a fixed version for this vulnerability in the available references. Affected deployments should monitor the Altium security advisories page [1] for updates. Network segmentation and restricting access to the SOAP endpoint may serve as temporary workarounds until a patch is released.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.