No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 09 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rachelos
Rachelos werss We-mp-rss |
|
| Vendors & Products |
Rachelos
Rachelos werss We-mp-rss |
Mon, 09 Feb 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in rachelos WeRSS we-mp-rss up to 1.4.8. This issue affects some unknown processing of the file core/auth.py of the component JWT Handler. Performing a manipulation of the argument SECRET_KEY results in use of default cryptographic key. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is assessed as difficult. The exploit is now public and may be used. | |
| Title | rachelos WeRSS we-mp-rss JWT auth.py default key | |
| Weaknesses | CWE-1394 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-09T16:03:43.026Z
Reserved: 2026-02-08T08:30:03.928Z
Link: CVE-2026-2215
Updated: 2026-02-09T16:03:40.113Z
Status : Awaiting Analysis
Published: 2026-02-09T05:16:25.100
Modified: 2026-02-09T16:08:35.290
Link: CVE-2026-2215
No data.
OpenCVE Enrichment
Updated: 2026-02-09T10:39:19Z