Description
A weakness has been identified in MineAdmin 1.x/2.x. This impacts the function refresh of the file /system/refresh of the component JWT Token Handler. This manipulation causes insufficient verification of data authenticity. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-20
Score: 2.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: Potential unauthorized JWT refresh leading to elevated privileges
Action: Apply patch
AI Analysis

Impact

A weakness in MineAdmin version 1.x and 2.x allows an attacker to manipulate the /system/refresh endpoint of the JWT Token Handler. The manipulation results in insufficient verification of data authenticity, meaning the server accepts forged or tampered JWT refresh requests. This is an instance of CWE‑345, which concerns insufficient verification of data authenticity. Such a flaw can enable a remote attacker to generate valid session tokens and gain unauthorized access to protected resources.

Affected Systems

The vulnerability affects all MineAdmin installations running versions 1.x and 2.x. The specific component impacted is the file "/system/refresh" in the JWT Token Handler module of the MineAdmin application.

Risk and Exploitability

The CVSS score is 2.3 and the EPSS score is below 1%, indicating low but non‑zero exploitation probability. The description notes high attack complexity and difficult exploitability, yet the exploit has been made publicly available. The vulnerability is not listed in the CISA KEV catalog, but the lack of vendor response suggests that a patch may not have been released. As a result, the risk to impacted environments persists until remediation is applied.

Generated by OpenCVE AI on April 16, 2026 at 18:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Restrict access to the /system/refresh endpoint so that only authenticated administrators can invoke it, using role‑based access controls or IP whitelisting.
  • If a vendor patch is not yet available, temporarily disable or block the /system/refresh functionality to prevent exploitation.
  • Implement thorough logging of all JWT refresh requests and monitor logs for abnormal or repeated token renewal attempts.

Generated by OpenCVE AI on April 16, 2026 at 18:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-43rr-x62x-q96w MineAdmin improperly refreshes tokens
History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mineadmin:mineadmin:*:*:*:*:*:*:*:*

Thu, 05 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mineadmin:mineadmin:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mineadmin:mineadmin:2.0:*:*:*:*:*:*:*

Tue, 20 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Mineadmin
Mineadmin mineadmin
Vendors & Products Mineadmin
Mineadmin mineadmin

Tue, 20 Jan 2026 00:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in MineAdmin 1.x/2.x. This impacts the function refresh of the file /system/refresh of the component JWT Token Handler. This manipulation causes insufficient verification of data authenticity. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title MineAdmin JWT Token refresh data authenticity
Weaknesses CWE-345
References
Metrics cvssV2_0

{'score': 4.6, 'vector': 'AV:N/AC:H/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Mineadmin Mineadmin
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-25T12:32:32.016Z

Reserved: 2026-01-19T13:59:56.238Z

Link: CVE-2026-1195

cve-icon Vulnrichment

Updated: 2026-01-20T17:05:08.930Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-20T01:15:56.260

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1195

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T18:15:43Z

Weaknesses