Description
yeti-platform yeti before 2.1.12 allows attackers to generate valid JWT tokens is the secret is not changed (by setting YETI_AUTH_SECRET_KEY to a value other than SECRET).
Published: 2026-05-08
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability allows an attacker who can determine the YETI_AUTH_SECRET_KEY to create arbitrary JSON Web Tokens that the Yeti platform will accept as authentic. By forging these tokens, a malicious actor could impersonate any user or service account present in the system, potentially accessing sensitive data and performing privileged operations. The weakness resides in the improper handling of the JWT signing key, enabling credential misuse. The vulnerability is documented as CVE-2024-46508 and originates from a configuration limitation rather than a software bug.

Affected Systems

The flaw affects Yeti Platform versions prior to 2.1.12. Any deployment that has not changed the default or hard‑coded YETI_AUTH_SECRET_KEY is susceptible. The vendor is not listed in the CNA records, but affected installations are those running the open‑source Yeti platform where the secret key remains at its default value.

Risk and Exploitability

The exploit requires knowledge of the current secret key; the key can be default or manually set to a predictable value. Once the key is known, the attacker can generate a valid JWT with any desired claims and present it to the service. The system will accept it without further verification, effectively bypassing authentication. No EPSS score is available and the vulnerability is not present in CISA KEV, but its impact is severe because authentication is compromised. If the secret is not changed, any potential attacker can create valid credentials and impersonate any user, leading to full system compromise.

Generated by OpenCVE AI on May 8, 2026 at 06:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Change YETI_AUTH_SECRET_KEY to a strong, unique value and store it securely
  • Upgrade to Yeti Platform version 2.1.12 or later which implements a required secret change
  • After updating the secret, audit existing JWT tokens and regenerate them to ensure no stale, forged tokens remain

Generated by OpenCVE AI on May 8, 2026 at 06:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 05:45:00 +0000

Type Values Removed Values Added
Description yeti-platform yeti before 2.1.12 allows attackers to generate valid JWT tokens is the secret is not changed (by setting YETI_AUTH_SECRET_KEY to a value other than SECRET).
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-08T05:19:58.465Z

Reserved: 2024-09-11T00:00:00.000Z

Link: CVE-2024-46508

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T06:16:09.963

Modified: 2026-05-08T06:16:09.963

Link: CVE-2024-46508

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T06:30:46Z

Weaknesses

No weakness.