From c9f33bdc7e7cb40222a29193c0c7c9e5234ea106 Mon Sep 17 00:00:00 2001 From: rvz <84989569+rvizx@users.noreply.github.com> Date: Wed, 29 Apr 2026 21:58:27 +0530 Subject: [PATCH] Improve GHSA-qpv2-rwc8-c993 --- .../GHSA-qpv2-rwc8-c993.json | 61 +++++++++++++++++++ 1 file changed, 61 insertions(+) create mode 100644 advisories/unreviewed/2026/04/GHSA-qpv2-rwc8-c993/GHSA-qpv2-rwc8-c993.json diff --git a/advisories/unreviewed/2026/04/GHSA-qpv2-rwc8-c993/GHSA-qpv2-rwc8-c993.json b/advisories/unreviewed/2026/04/GHSA-qpv2-rwc8-c993/GHSA-qpv2-rwc8-c993.json new file mode 100644 index 0000000000000..8bcfc2db8c88f --- /dev/null +++ b/advisories/unreviewed/2026/04/GHSA-qpv2-rwc8-c993/GHSA-qpv2-rwc8-c993.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qpv2-rwc8-c993", + "modified": "2026-04-28T21:37:12Z", + "published": "2026-04-28T18:30:33Z", + "aliases": [ + "CVE-2026-38651" + ], + "summary": "JWT Verification Bypass in Netmaker Allows Unauthenticated Access to Host Endpoints", + "details": "Authentication Bypass vulnerability exists in Netmaker versions prior to 1.5.0. The VerifyHostToken function in logic/jwts.go fails to validate the JWT signature when verifying host tokens. An attacker can forge a JWT signed with any arbitrary key and use it to impersonate any host in the network, gaining access to sensitive information", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.5.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-38651" + }, + { + "type": "WEB", + "url": "https://github.com/gravitl/netmaker/commit/5309aa70d464ef565911369714d661a61481a79b" + }, + { + "type": "WEB", + "url": "https://www.zyenra.com/advisories/netmaker-jwt-verification-bypass" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-347" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-04-28T16:16:13Z" + } +} \ No newline at end of file