Description
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, when JWT authentication is configured using either "authJwtPubKeyPath" (local RSA public key) or "authJwtHmacSecret" (HMAC secret), the configured audience value (authJwtAud) is not enforced during token parsing. As a result, validly signed JWT tokens with an incorrect aud claim are accepted for authentication. This allows authentication using tokens intended for a different audience/service. This issue has been patched in version 3000.11.1.
Published: 2026-03-06
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Patch Now
AI Analysis

Impact

OliveTin’s authentication mechanism allows predefined shell commands to be executed from a web interface. When JWT authentication is configured with a local RSA public key or an HMAC secret, the audience claim (authJwtAud) is not enforced during token parsing. As a result, a token that is correctly signed but contains an incorrect audience value is still accepted as valid. This flaw requires a valid signature but permits the use of tokens intended for a different audience or service, effectively bypassing authentication checks. The vulnerability is classified as an authentication bypass (CWE‑287) and an incorrect audience validation (CWE‑345).

Affected Systems

The flaw affects OliveTin OliveTin, versions prior to 3000.11.1. The patch was released in the 3000.11.1 release. No other vendor or product versions are affected. If you are running any version older than 3000.11.1, the vulnerability is present.

Risk and Exploitability

Based on the description, OliveTin provides a web interface for predefined shell commands and uses JWT for authentication. The flaw occurs when a validly signed JWT contains an incorrect audience claim; the audience is not checked. Consequently, if an attacker has a JWT that is correctly signed for OliveTin but carries a different audience, that token will still be accepted, allowing the attacker to authenticate as an arbitrary user. The attack is therefore a remote network attack where the adversary supplies forged JWTs. It requires that the attacker already obtains a JWT with a valid signature for OliveTin; once that is achieved, the audience claim is ignored, and the attacker gains the ability to execute any command the application permits. The flaw is rated high severity with a CVSS score of 8.8, but the EPSS indicates a very low exploitation probability. The vulnerability is not included in the CISA KEV catalog. The risk remains significant because gaining authenticated access exposes execution privileges for arbitrary shell commands.

Generated by OpenCVE AI on April 17, 2026 at 12:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OliveTin to version 3000.11.1 or later.
  • Disable JWT authentication if it is not required for your environment.
  • Ensure the audience claim (authJwtAud) is set correctly and validate only accepted audiences, if the configuration allows limiting acceptance.

Generated by OpenCVE AI on April 17, 2026 at 12:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g962-2j28-3cg9 OliveTin has JWT Audience Validation Bypass in Local Key and HMAC Modes
History

Thu, 12 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:olivetin:olivetin:*:*:*:*:*:*:*:*

Mon, 09 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Olivetin
Olivetin olivetin
Vendors & Products Olivetin
Olivetin olivetin

Fri, 06 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Description OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, when JWT authentication is configured using either "authJwtPubKeyPath" (local RSA public key) or "authJwtHmacSecret" (HMAC secret), the configured audience value (authJwtAud) is not enforced during token parsing. As a result, validly signed JWT tokens with an incorrect aud claim are accepted for authentication. This allows authentication using tokens intended for a different audience/service. This issue has been patched in version 3000.11.1.
Title OliveTin: JWT Audience Validation Bypass in Local Key and HMAC Modes
Weaknesses CWE-287
CWE-345
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Olivetin Olivetin
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T20:54:29.764Z

Reserved: 2026-03-04T17:23:59.797Z

Link: CVE-2026-30223

cve-icon Vulnrichment

Updated: 2026-03-09T20:51:36.420Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T21:16:16.113

Modified: 2026-03-12T16:05:52.767

Link: CVE-2026-30223

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:30:06Z

Weaknesses