Skip to content
Threat Feed

Tag

Authentication Bypass

65 briefs RSS
high advisory

WordPress Easy PayPal Events & Tickets Plugin Authentication Bypass Vulnerability

An unauthenticated remote attacker can exploit a hardcoded authentication bypass vulnerability in the Easy PayPal Events & Tickets plugin for WordPress (versions 1.3 and earlier) by providing 'test' as the hash parameter, allowing retrieval of sensitive order details.

Easy PayPal Events & Tickets plugin wordpress authentication bypass vulnerability
2r 1t 1c 1i
high advisory

Quarkus Vertx HTTP Authorization Bypass via Matrix Parameters

Quarkus Vertx HTTP versions < 3.20.6.1, >= 3.21.0 and < 3.27.3.1, >= 3.30.0 and < 3.33.1.1, and >= 3.34.0 and < 3.35.1.1 are vulnerable to an authorization bypass where appending a semicolon and arbitrary text to the request URL allows unauthorized access to protected resources.

Quarkus Vertx HTTP +3 authentication-bypass authorization-bypass web-application
2r 2t
critical threat

Critical Authentication Bypass Vulnerability in MOVEit Automation (CVE-2026-4670)

A critical authentication bypass vulnerability (CVE-2026-4670) in Progress MOVEit Automation allows an unauthenticated remote attacker to gain administrative access, potentially leading to full control over the application and sensitive file transfer workflows.

exploited MOVEit Automation +3 authentication-bypass privilege-escalation cve-2026-4670 cve-2026-5174 webserver
2r 2t 2c
high advisory

AAP Gateway Account Hijacking Vulnerability (CVE-2026-6266)

CVE-2026-6266 allows a remote attacker to hijack user accounts in AAP gateway by manipulating the IDP-provided email during the user auto-linking process, potentially gaining unauthorized access, including administrative privileges.

AAP cve-2026-6266 account-hijacking authentication-bypass
2r 1t 1c
high advisory

YunaiV yudao-cloud Authentication Bypass Vulnerability (CVE-2026-7710)

YunaiV yudao-cloud up to version 3.8.0 is vulnerable to an authentication bypass (CVE-2026-7710) due to improper handling of the mock-token argument in the JwtAuthenticationTokenFilter.java file, allowing remote attackers to bypass authentication.

yudao-cloud <= 3.8.0 +1 authentication bypass cve-2026-7710 web application
2r 1t 1c
high threat

InnoShop Improper Authentication Vulnerability (CVE-2026-7630)

InnoShop version 0.7.8 and earlier contains an improper authentication vulnerability in the InstallServiceProvider::boot function (CVE-2026-7630) that allows remote attackers to bypass authentication and gain unauthorized access to the installation endpoint.

exploited InnoShop cve authentication bypass web application
2r 1t 1c
critical threat

WordPress User Verification Plugin Authentication Bypass Vulnerability

The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in versions up to 2.0.46 due to a loose PHP comparison, allowing unauthenticated attackers to log in as any verified user by submitting a 'true' OTP value.

User Verification by PickPlugins plugin for WordPress <= 2.0.46 wordpress authentication bypass cve-2026-7458
2r 1t 1c
critical advisory

WordPress Temporary Login Plugin Authentication Bypass (CVE-2026-7567)

The Temporary Login plugin for WordPress versions up to 1.0.0 is vulnerable to authentication bypass due to improper input validation, allowing unauthenticated attackers to log in as arbitrary temporary users by sending a specially crafted GET request.

Temporary Login plugin authentication bypass wordpress plugin vulnerability cve-2026-7567 cloud
2r 1t 1c
critical threat

Critical Authentication Bypass Vulnerability in cPanel & WHM (CVE-2026-41940)

CVE-2026-41940 is a critical authentication bypass vulnerability in cPanel & WHM, allowing unauthenticated remote attackers to gain administrative access by manipulating session data.

exploited cPanel & WHM authentication bypass cPanel web hosting vulnerability
2r 1t 1c
critical advisory

ABB Edgenius Management Portal Authentication Bypass Vulnerability

An authentication bypass vulnerability in ABB Edgenius Management Portal versions 3.2.0.0 and 3.2.1.1 allows attackers to execute arbitrary code and modify application configurations by sending a specially crafted message to the system node.

Edgenius Management Portal 3.2.0.0 +2 abb edgenius authentication bypass CVE-2025-10571 critical infrastructure
2r 1t 1c
high advisory

ABB Ability OPTIMAX Authentication Bypass Vulnerability

CVE-2025-14510 allows an attacker to bypass Azure Active Directory Single-Sign On authentication in vulnerable ABB Ability OPTIMAX versions, potentially granting unauthorized access to critical infrastructure systems.

OPTIMAX 6.1 +4 authentication bypass ics vulnerability
2r 1t 1c
critical advisory

cPanel and WHM Authentication Bypass Vulnerability (CVE-2026-41940)

An authentication bypass vulnerability in cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5 allows unauthenticated remote attackers to gain unauthorized access to the control panel.

WHM +1 cpanel authentication-bypass CVE-2026-41940 webserver
2r 1t 1c
critical advisory

Multiple Vulnerabilities in Spring Boot Allow Authorization Bypass and Potential RCE

Multiple vulnerabilities in Spring Boot, including CVE-2026-40976, CVE-2026-40973, and CVE-2026-40972, can allow attackers to bypass authorization, hijack sessions, or achieve remote code execution, potentially leading to data breaches and system compromise.

Spring Boot spring-boot vulnerability rce authentication-bypass session-hijacking
2r 3t 3c
high advisory

SmythOS sre Authentication Bypass Vulnerability (CVE-2026-7022)

A remote improper authentication vulnerability exists in SmythOS sre up to version 0.0.15, allowing attackers to bypass authentication by manipulating the X-DEBUG-RUN/X-DEBUG-INJ arguments in the HTTP Header Handler component.

sre authentication-bypass CVE-2026-7022
2r 1t 1c
critical advisory

Multiple Vulnerabilities in Cisco Products Allow for Remote Code Execution

Multiple vulnerabilities in Cisco ASA, Secure Firewall Threat Defense, IOS, IOS XE, and IOS XR allow a remote attacker to bypass authentication and execute arbitrary code with administrator privileges.

ASA +4 cisco vulnerability rce authentication-bypass
2r 4t 3c
critical advisory

OpenVPN-auth-oauth2 Authentication Bypass in Plugin Mode

A critical authentication bypass vulnerability exists in openvpn-auth-oauth2 versions 1.26.3 through 1.27.2 when deployed in the experimental plugin mode; clients that do not support WebAuth/SSO are incorrectly granted VPN access without completing OIDC authentication.

openvpn-auth-oauth2 openvpn authentication-bypass vpn
2r 1t
medium threat

NVIDIA KAI Scheduler Authentication Bypass Vulnerability

CVE-2026-24177 describes an authentication bypass vulnerability in NVIDIA KAI Scheduler that could allow unauthorized access to API endpoints, leading to information disclosure.

exploited vulnerability authentication-bypass nvidia
2r 2t 1c
critical threat

JetBrains TeamCity Authentication Bypass and Path Traversal Vulnerabilities

Unpatched JetBrains TeamCity servers are being actively exploited via an authentication bypass (CVE-2024-27198) and path traversal vulnerability (CVE-2024-27199), allowing attackers to perform administrative actions and potentially conduct supply-chain attacks.

exploited teamcity vulnerability authentication bypass path traversal supply-chain
2r 1t 2c
high advisory

Rowboatlabs Rowboat Improper Authentication Vulnerability (CVE-2026-6635)

An improper authentication vulnerability in rowboatlabs rowboat <=0.1.67 allows remote attackers to bypass authentication by manipulating the X-Tools-JWE argument in the tool_call function, potentially leading to unauthorized access and control.

cve-2026-6635 authentication bypass web application
2r 1t 1c
critical advisory

liangliangyy DjangoBlog Authentication Bypass Vulnerability (CVE-2026-6577)

A critical authentication bypass vulnerability in liangliangyy DjangoBlog up to version 2.1.0.0 (CVE-2026-6577) allows remote attackers to inject arbitrary GPS data without authentication via the logtracks endpoint, potentially leading to data manipulation and unauthorized access.

cve-2026-6577 djangoblog authentication-bypass gps-injection web-application
2r 1t 1c
critical advisory

FastGPT NoSQL Injection Vulnerability (CVE-2026-40351)

FastGPT versions before 4.14.9.5 are vulnerable to NoSQL injection, allowing unauthenticated attackers to bypass authentication and gain administrative access.

NoSQL injection authentication bypass CVE-2026-40351 FastGPT
2r 1t 1c 3i
high advisory

Anviz CX2 Lite and CX7 Unauthenticated Debug Setting Modification

Anviz CX2 Lite and CX7 devices are vulnerable to unauthenticated POST requests that allow modification of debug settings such as enabling SSH, leading to unauthorized state changes and potential compromise.

cve-2026-40461 authentication-bypass iot
2r 1t 1c
critical advisory

OpenViking Authentication Bypass Vulnerability (CVE-2026-40525)

OpenViking versions prior to commit c7bb167 are vulnerable to an authentication bypass that allows remote attackers to invoke privileged bot-control functionality without authentication when the api_key configuration is unset or empty, potentially leading to unauthorized access to downstream systems and data.

CVE-2026-40525 authentication-bypass openviking api
2r 1t 1c
high advisory

Paperclip Unauthenticated API Access Vulnerability

Paperclip application suffers from multiple unauthenticated API access vulnerabilities allowing attackers to access sensitive data, gather reconnaissance, and potentially bypass authentication.

paperclip authentication-bypass api-vulnerability
2r 3t
high advisory

Velociraptor Authentication Bypass via query() Plugin

Velociraptor versions prior to 0.76.3 contain an authentication bypass vulnerability in the query() plugin, allowing authenticated users to access data from other organizations within the Velociraptor deployment, potentially leading to unauthorized data access and privilege escalation.

velociraptor authentication bypass privilege escalation cve-2026-6290
2r 2t 1c
critical advisory

OAuth2 Proxy Authentication Bypass via User-Agent Header

A critical authentication bypass vulnerability (CVE-2026-34457) exists in OAuth2 Proxy when used with `auth_request`-style integration and either `--ping-user-agent` is set or `--gcp-healthchecks` is enabled, allowing unauthenticated access to protected resources.

oauth2-proxy authentication-bypass web-application
2r 1t
high advisory

Industrial Edge Management Authentication Bypass Vulnerability (CVE-2026-33892)

CVE-2026-33892 allows an unauthenticated remote attacker to bypass authentication and impersonate a legitimate user in affected Industrial Edge Management Pro and Virtual versions by exploiting improper enforcement of user authentication on remote connections to devices, potentially enabling unauthorized access and control.

CVE-2026-33892 authentication-bypass industrial-control-system edge-management
2r 1t 1c
high advisory

SINEC NMS Authentication Bypass Vulnerability (CVE-2026-24032)

An authentication bypass vulnerability (CVE-2026-24032) exists in SINEC NMS versions prior to V4.0 SP3 due to insufficient user identity validation in the UMC component, allowing unauthenticated remote attackers to gain unauthorized access.

sinec-nms authentication-bypass cve-2026-24032 siemens
2r 1t 1c 1i
high advisory

MinIO Unauthenticated Object Write Vulnerability

Two authentication bypass vulnerabilities in MinIO allow writing arbitrary objects to any bucket with only a valid access key, without the secret key or valid signature, impacting all MinIO deployments.

minio authentication-bypass object-storage
2r 3t
critical advisory

zhayujie chatgpt-on-wechat CowAgent Authentication Bypass (CVE-2026-6129)

CVE-2026-6129 is a critical vulnerability in zhayujie chatgpt-on-wechat CowAgent up to version 2.0.4, allowing remote attackers to bypass authentication via manipulation of the Agent Mode Service.

cve-2026-6129 authentication-bypass chatgpt-on-wechat
2r 1t 1c 1i
high advisory

zhayujie chatgpt-on-wechat CowAgent Authentication Bypass Vulnerability (CVE-2026-6126)

CVE-2026-6126 is an unauthenticated remote code execution vulnerability in zhayujie chatgpt-on-wechat CowAgent 2.0.4 due to missing authentication in the Administrative HTTP Endpoint.

CVE-2026-6126 authentication-bypass web-application
2r 1t 1c
high advisory

Laravel Passport Authentication Bypass Vulnerability (CVE-2026-39976)

Laravel Passport versions 13.0.0 before 13.7.1 contain an authentication bypass vulnerability (CVE-2026-39976) where machine-to-machine tokens can authenticate as a real user due to improper validation of the JWT sub claim.

cve-2026-39976 laravel oauth2 authentication bypass
2r 1t 1c
high advisory

LiteLLM Authentication Bypass via Password Hash Exposure and Pass-the-Hash

LiteLLM versions before 1.83.0 stored user passwords as unsalted SHA-256 hashes and exposed these hashes through multiple API endpoints, enabling an authenticated user to retrieve another user's password hash and use it to log in as that user due to the /v2/login endpoint accepting the raw SHA-256 hash without re-hashing, leading to potential privilege escalation.

litellm authentication-bypass credential-access privilege-escalation
2r 1t
high advisory

Totolink A8000R Authentication Bypass Vulnerability (CVE-2026-5676)

A remote, unauthenticated attacker can bypass authentication on Totolink A8000R routers running firmware version 5.9c.681_B20180413 by manipulating the `langType` argument in the `setLanguageCfg` function of the `/cgi-bin/cstecgi.cgi` file.

cve-2026-5676 authentication-bypass totolink
2r 1t 1c
high advisory

Mattermost Legal Hold Plugin Authentication Bypass Vulnerability

Mattermost Legal Hold plugin versions 1.1.4 and earlier allow authenticated attackers to bypass authorization checks, enabling unauthorized access and modification of legal hold data via crafted API requests.

mattermost authentication-bypass legal-hold
2r 2t 1c
high advisory

GPT Researcher Authentication Bypass Vulnerability (CVE-2026-5632)

CVE-2026-5632 is an authentication bypass vulnerability in assafelovic gpt-researcher up to version 3.4.3, affecting the HTTP REST API Endpoint and allowing remote attackers to perform actions without proper authorization.

CVE-2026-5632 authentication-bypass web-application
2r 1t 1c
high advisory

JeecgBoot AI Chat Module Authentication Bypass Vulnerability

JeecgBoot versions 3.9.0 and 3.9.1 are vulnerable to a remote unauthenticated bypass in the AI Chat Module, specifically affecting the JeecgBizToolsProvider.java file, potentially allowing unauthorized access.

jeecgboot authentication-bypass ai-chat-module
2r 1t 1c
high advisory

Technostrobe HI-LED-WR120-G2 Improper Authentication Vulnerability (CVE-2026-5570)

CVE-2026-5570 is an improper authentication vulnerability in the index_config function of the /LoginCB file of Technostrobe HI-LED-WR120-G2 version 5.5.0.1R6.03.30, allowing remote attackers to bypass authentication.

cve authentication-bypass webserver
2r 1t 1c
critical advisory

PraisonAI Gateway Unauthenticated Access Vulnerability

PraisonAI Gateway server versions prior to 4.5.97 allow unauthenticated access to WebSocket connections and agent topology, enabling unauthorized message sending and agent enumeration.

vulnerability authentication bypass websocket
2r 1t 1c
high advisory

OAuthenticator Authentication Bypass Vulnerability (CVE-2026-33175)

OAuthenticator versions prior to 17.4.0 contain an authentication bypass vulnerability (CVE-2026-33175) that allows an attacker with an unverified email address on an Auth0 tenant to log in to JupyterHub when email is used as the username claim, potentially leading to account takeover.

authentication-bypass jupyterhub oauthenticator cve-2026-33175
2r 1t
high advisory

Unauthenticated Access to Administrative Endpoint (CVE-2026-32646)

CVE-2026-32646 allows unauthenticated access to a specific administrative endpoint, potentially exposing device management functions, with a CVSS v3.1 score of 7.5.

cve-2026-32646 authentication-bypass device-management
2r 1t 1c
critical advisory

Critical Authentication Bypass Vulnerability in Cisco Integrated Management Controller (CVE-2026-20093)

An unauthenticated remote attacker can exploit CVE-2026-20093 to bypass authentication in Cisco Integrated Management Controller (IMC), gain full administrative access, and manipulate hardware settings, potentially disrupting critical infrastructure.

authentication bypass cisco imc cve-2026-20093
3r 3t 1c
critical advisory

OneUptime SAML SSO Authentication Bypass Vulnerability (CVE-2026-34840)

OneUptime versions prior to 10.0.42 are vulnerable to an authentication bypass due to improper SAML signature validation, allowing attackers to impersonate users by prepending unsigned assertions.

CVE-2026-34840 saml authentication-bypass webserver
2r 1t 1c
critical advisory

Hirschmann HiEOS HTTP(S) Management Module Authentication Bypass (CVE-2024-14034)

Hirschmann HiEOS devices contain an authentication bypass vulnerability (CVE-2024-14034) in the HTTP(S) management module, allowing unauthenticated remote attackers to gain administrative access by sending specially crafted HTTP(S) requests.

authentication bypass cve-2024-14034 hieos ics
2r 1t 1c
high advisory

goshs Authentication Bypass Vulnerability (CVE-2026-34581)

goshs versions 1.1.0 to before 2.0.0-beta.2 are vulnerable to authentication bypass via Share Token, potentially allowing code execution (CVE-2026-34581).

cve-2026-34581 authentication-bypass code-execution
1r 1t
high advisory

vanna-ai vanna Authentication Bypass Vulnerability (CVE-2026-5320)

CVE-2026-5320 describes an unauthenticated remote access vulnerability in vanna-ai vanna up to version 2.0.2 via manipulation of the /api/vanna/v2/ Chat API endpoint, potentially allowing unauthorized access and actions.

authentication-bypass cve-2026-5320 vanna-ai
2r 2t 1c
high advisory

IBM Verify and Security Verify Access Authentication Bypass Vulnerability

CVE-2026-4101 describes an authentication bypass vulnerability in IBM Verify Identity Access Container and IBM Security Verify Access Container versions 11.0 through 11.0.2 and 10.0 through 10.0.9.1, respectively, that could allow unauthorized access under specific load conditions.

authentication-bypass cve-2026-4101 ibm-verify
2r 1t 1c
high advisory

Goshs Authentication Bypass via Share Token

Goshs is vulnerable to an authentication bypass via share tokens, allowing attackers to bypass authentication checks by using a valid share token in conjunction with other functionalities like WebSocket connections to gain unauthorized access and execute arbitrary commands on the server.

authentication-bypass code-execution goshs
2r 3t 2i
high advisory

Multiple Vulnerabilities in Dovecot Mail Server

Multiple vulnerabilities in Dovecot can be exploited by an attacker to perform SQL injection attacks, bypass authentication, disclose sensitive information, or cause a denial-of-service condition.

dovecot vulnerability sql-injection authentication-bypass dos
2r 2t
high advisory

OpenClaw Feishu Webhook Authentication Bypass (CVE-2026-32974)

OpenClaw before 2026.3.12 is vulnerable to an authentication bypass in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing unauthenticated network attackers to inject forged Feishu events and trigger downstream tool execution.

authentication-bypass webhook cve-2026-32974
2r 1t
critical advisory

OpenBao OIDC Direct Callback Authentication Bypass Vulnerability

OpenBao versions before 2.5.2 lack user confirmation for OIDC direct callback mode, allowing attackers to perform remote phishing and bypass authentication.

openbao oidc authentication-bypass phishing
2r 1t
critical advisory

Wecodex Hotel CMS 1.0 SQL Injection Vulnerability

Wecodex Hotel CMS 1.0 is vulnerable to SQL injection in the admin login functionality, allowing unauthenticated attackers to bypass authentication and potentially extract sensitive database information or gain administrative access by injecting SQL code through the username parameter in POST requests to index.php with action=processlogin.

sqli web-application authentication-bypass
2r 1t
high advisory

MacCMS 2025.1000.4052 Missing Authentication Vulnerability (CVE-2026-4562)

A missing authentication vulnerability exists in MacCMS 2025.1000.4052, specifically affecting the Timming API Endpoint component in application/api/controller/Timming.php, allowing remote attackers to bypass authentication.

CVE-2026-4562 authentication-bypass web-application
2r 1t
critical advisory

Contest Gallery WordPress Plugin Authentication Bypass Vulnerability (CVE-2026-4021)

CVE-2026-4021 describes an authentication bypass vulnerability in the Contest Gallery plugin for WordPress, allowing unauthenticated attackers to gain admin access by manipulating the user activation key and using an AJAX login endpoint.

wordpress authentication-bypass plugin-vulnerability cve-2026-4021
2r 3t 1i
critical advisory

Critical Vulnerabilities in Quest KACE SMA Allow System Takeover

Multiple critical vulnerabilities in Quest KACE Systems Management Appliance (SMA), including authentication bypass and 2FA bypass, allow unauthenticated attackers to achieve system takeover and cause denial of service; active exploitation is reported.

quest-kace vulnerability authentication-bypass 2fa-bypass denial-of-service sma
2r 4t
critical advisory

Apache Artemis and ActiveMQ Artemis Authentication Bypass Vulnerability

CVE-2026-27446 allows an unauthenticated remote attacker to inject malicious messages or exfiltrate data from Apache Artemis and ActiveMQ Artemis brokers due to a missing authentication check in the Core protocol.

apache-artemis apache-activemq authentication-bypass message-injection data-exfiltration
2r 5t
high advisory

Pelco Sarix Pro 3 Series IP Camera Authentication Bypass Vulnerability

An authentication bypass vulnerability (CVE-2026-1241) in the web management interface of Pelco Sarix Pro 3 Series IP Cameras (versions <= 02.52) allows unauthenticated attackers to access sensitive device data and bypass surveillance controls.

cve-2026-1241 authentication-bypass ip-camera ics
2r 1t
high advisory

Traefik ForwardAuth Authentication Bypass via X-Forwarded-Prefix Spoofing

A high-severity authentication bypass vulnerability exists in Traefik's `ForwardAuth` middleware when `trustForwardHeader=false` is configured and Traefik is deployed behind a trusted upstream proxy; Traefik fails to sanitize the `X-Forwarded-Prefix` header, allowing attackers to spoof a trusted prefix value and gain unauthorized access to protected backend routes.

Traefik authentication-bypass webserver
2r 1t
critical advisory

Dgraph Unauthenticated Admin Token Disclosure via /debug/vars

Dgraph versions prior to 25.3.3 expose the admin token via the `/debug/vars` endpoint, allowing unauthenticated attackers to bypass authentication and gain administrative access.

Dgraph authentication-bypass admin-token-disclosure
3r 2t
high advisory

PrefectHQ Prefect Authentication Bypass Vulnerability (CVE-2026-7723)

PrefectHQ Prefect versions up to 3.6.13 are vulnerable to an authentication bypass via manipulation of the /api/events/in WebSocket endpoint, potentially allowing remote attackers to execute unauthorized actions.

prefect CVE-2026-7723 authentication-bypass websocket prefecthq
2r 1t 1c
high advisory

CoreDNS TSIG Authentication Bypass Vulnerability

CoreDNS versions prior to 1.14.3 are vulnerable to TSIG authentication bypass on gRPC, QUIC, DoH, and DoH3 transports, allowing unauthenticated network attackers to bypass authentication and potentially access TSIG-protected zone data or submit dynamic DNS updates.

coredns tsig authentication-bypass
2r 1t
critical advisory

WebPros cPanel & WHM and WP2 Authentication Bypass Vulnerability (CVE-2026-41940)

CVE-2026-41940 is an authentication bypass vulnerability in WebPros cPanel & WHM and WP2 (WordPress Squared) that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

cPanel & WHM +1 cpanel whm wp2 wordpress authentication-bypass cve-2026-41940 initial-access
2r 1t 1c
critical threat

PaperCut NG/MF Improper Authentication Vulnerability (CVE-2023-27351)

CVE-2023-27351 is an improper authentication vulnerability in PaperCut NG/MF that allows remote attackers to bypass authentication via the SecurityRequestFilter class, leading to potential ransomware deployment.

exploited NG/MF papercut authentication-bypass ransomware cve-2023-27351
2r 1t 1c
critical advisory

Note Mark OIDC Authentication Bypass via Hardcoded Password

A critical authentication bypass vulnerability in note-mark allows attackers to authenticate as any OIDC-registered user by submitting the password 'null' to the internal login endpoint due to a hardcoded bcrypt hash fallback, potentially leading to account takeover and persistent access.

note-mark authentication-bypass credential-access ghsa
2r 1t
high advisory

666ghj MiroFish REST API Authentication Bypass (CVE-2026-7042)

A missing authentication vulnerability (CVE-2026-7042) exists in 666ghj MiroFish up to version 0.1.2, allowing remote attackers to bypass authentication via manipulation of the REST API Endpoint's create_app function.

MiroFish cve-2026-7042 authentication-bypass rest-api
2r 1t 1c