{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-23958","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-01-19T14:49:06.313Z","datePublished":"2026-01-22T01:42:11.514Z","dateUpdated":"2026-01-26T16:18:33.334Z"},"containers":{"cna":{"title":"DataEase Vulnerable to Brute-Force Attack on Admin JWT Secret Derived from Password that Enables Full Account Takeover","problemTypes":[{"descriptions":[{"cweId":"CWE-522","lang":"en","description":"CWE-522: Insufficiently Protected Credentials","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P","version":"4.0"}}],"references":[{"name":"https://github.com/dataease/dataease/security/advisories/GHSA-5wvm-4m4q-rh7j","tags":["x_refsource_CONFIRM"],"url":"https://github.com/dataease/dataease/security/advisories/GHSA-5wvm-4m4q-rh7j"}],"affected":[{"vendor":"dataease","product":"dataease","versions":[{"version":"< 2.10.19","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-01-22T01:42:11.514Z"},"descriptions":[{"lang":"en","value":"Dataease is an open source data visualization analysis tool. Prior to version 2.10.19, DataEase uses the MD5 hash of the user’s password as the JWT signing secret. This deterministic secret derivation allows an attacker to brute-force the admin’s password by exploiting unmonitored API endpoints that verify JWT tokens. The vulnerability has been fixed in v2.10.19. No known workarounds are available."}],"source":{"advisory":"GHSA-5wvm-4m4q-rh7j","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-22T21:41:49.212091Z","id":"CVE-2026-23958","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-22T21:42:01.231Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2026-01-26T16:18:33.334Z"},"references":[{"url":"https://www.ox.security/blog/blog-dataease-cve-2026-23958-admin-takeover/"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}}]}}