<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-45091 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45091/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 15:09:56 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45091/feed.xml" rel="self" type="application/rss+xml"/><item><title>sealed-env Enterprise Mode TOTP Secret Leak in Unseal Tokens (CVE-2026-45091)</title><link>https://feed.craftedsignal.io/briefs/2026-05-sealed-env-totp-leak/</link><pubDate>Tue, 12 May 2026 15:09:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sealed-env-totp-leak/</guid><description>sealed-env versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every minted unseal token, allowing an attacker with a leaked token and the master key to mint new unseal tokens indefinitely.</description><content:encoded><![CDATA[<p>Versions 0.1.0-alpha.1 through 0.1.0-alpha.3 of sealed-env, when running in enterprise mode, improperly handled TOTP secrets. The application embedded the operator&rsquo;s plaintext TOTP secret within the JWS payload of each minted unseal token. Since JWS payloads are base64-encoded JSON and not encrypted, any entity that observed a minted token could extract the TOTP secret. This exposure could occur through various channels, including CI build logs, container environment dumps, <code>kubectl describe pod</code> outputs, or log aggregation systems. The issue was reported by an external reviewer after decoding the payload of a real minted token and confirming it matched the operator&rsquo;s <code>.env.local</code> TOTP secret. Version 0.1.0-alpha.4 patches this vulnerability (CVE-2026-45091) by replacing the embedded secret with a salt-bound HMAC derivative (<code>enterprise_epoch = HMAC(totpSecret, salt || &quot;epoch-v1&quot;)</code>). The change is incompatible, requiring re-sealing and TOTP secret rotation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains unauthorized access to the master key, possibly through a leaked CI secret or other compromise.</li>
<li>The attacker intercepts or obtains a single, previously minted unseal token. This token could be found in CI build logs, container environment variables, or other exposed locations.</li>
<li>The attacker decodes the base64-encoded JWS payload of the intercepted unseal token.</li>
<li>The attacker extracts the plaintext TOTP secret from the decoded JWS payload.</li>
<li>The attacker, possessing both the master key and the TOTP secret, can now generate valid unseal tokens.</li>
<li>The attacker uses the generated unseal tokens to unseal the environment for unauthorized deployments.</li>
<li>The attacker maintains persistent, unauthorized access to the sealed environment indefinitely.</li>
<li>The attacker achieves their objective, such as data exfiltration or code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows attackers to bypass the intended two-factor unsealing mechanism of sealed-env. An attacker with the master key and a single leaked unseal token can generate new, valid unseal tokens indefinitely. This compromises the security of any environment protected by sealed-env, allowing for unauthorized deployments and potentially leading to data breaches, service disruption, or other malicious activities. Successful exploitation allows unauthorized persistent access to sensitive applications and data protected by sealed-env.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to sealed-env version 0.1.0-alpha.4 or later to address CVE-2026-45091.</li>
<li>Rotate the TOTP secret after upgrading to version 0.1.0-alpha.4, as the old secret may have been compromised.</li>
<li>Reseal all files sealed by affected versions (0.1.0-alpha.1 through 0.1.0-alpha.3) due to the incompatible wire format change detailed in the CHANGELOG.md.</li>
<li>Implement robust logging and monitoring to detect unauthorized access attempts or unusual unsealing activities related to the leaked TOTP.</li>
<li>Examine historical logs for any exposed unseal tokens in CI build logs, container environment dumps, <code>kubectl describe pod</code> outputs, or log aggregation systems.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>credential-access</category><category>cve-2026-45091</category><category>sealed-env</category></item></channel></rss>