← Back to CVEs
CVE-2026-23958
CRITICAL9.8
Description
Dataease is an open source data visualization analysis tool. Prior to version 2.10.19, DataEase uses the MD5 hash of the user’s password as the JWT signing secret. This deterministic secret derivation allows an attacker to brute-force the admin’s password by exploiting unmonitored API endpoints that verify JWT tokens. The vulnerability has been fixed in v2.10.19. No known workarounds are available.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published1/22/2026
Last Modified2/17/2026
Sourcenvd
Honeypot Sightings0
Affected Products
dataease:dataease
Weaknesses (CWE)
CWE-522
References
https://github.com/dataease/dataease/security/advisories/GHSA-5wvm-4m4q-rh7j(security-advisories@github.com)
https://www.ox.security/blog/blog-dataease-cve-2026-23958-admin-takeover/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.