Impact
Misskey servers running versions from 8.45.0 up to and including 2026.3.0 contain a flaw whereby insufficient permission checks and input validation allow an attacker to retrieve data they should not be able to access. The weakness is an authorization oversight, classified as CWE-285, and could lead to a significant data breach.
Affected Systems
All publicly accessible Misskey instances operated by misskey-dev that are running any version between 8.45.0 and 2026.3.0, inclusive. The vulnerability exists regardless of whether federation between instances is enabled.
Risk and Exploitability
The vulnerability is rated CVSS 9.2, indicating critical risk. However, the EPSS score is less than 1%, indicating a very low overall probability of exploitation at this time, and it is not listed in the CISA Known Exploited Vulnerabilities catalog. Potential exploitation would likely occur remotely via exposed HTTP API endpoints, allowing attackers to craft requests that bypass standard authorization checks. Because the flaw exists in all affected versions, any instance that has not been upgraded to 2026.3.1 or newer is potentially vulnerable.
OpenCVE Enrichment