Description
Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. Prior to version 2.1.0, /users/login issues a temporary JWT (temp_token) for TOTP-enabled accounts. That token carries a pendingTOTP state and should only be valid for the second-factor flow. However, the auth middleware accepts this token on regular authenticated endpoints. This effectively turns 2FA into single-factor (password) for impacted accounts. This issue has been patched in version 2.1.0.
Published: 2026-05-08
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Before version 2.1.0, Termix issued a temporary JWT named temp_token for TOTP‑enabled accounts during login. The token, marked as pendingTOTP, was intended only for the second‑factor flow, but the authentication middleware accepted it on ordinary authenticated endpoints. As a result, attackers who had knowledge of a user’s password could obtain the temp_token and use it to access any system functionality, effectively disabling two‑factor authentication and allowing unauthorized actions. The flaw is characterized by CWE‑304, which involves the improper use of mutable tokens across privileged contexts.

Affected Systems

The vulnerability applies to the Termix web‑based server management platform, specifically all releases older than 2.1.0. The affected product is Termix, provided by Termix‑SSH, and it includes the SSH terminal, tunneling, and file editing features that are now accessible with the compromised token.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity exploit. No EPSS score is available, so the exact likelihood of exploitation cannot be quantified, but the lack of a KEV listing suggests the vulnerability is not yet known to be actively exploited in the wild. The attack vector would require an attacker to first authenticate with a valid username and password, then capture the temporary token from the login process or from an existing session cookie. Given the token’s broader acceptance, the exploitation could grant a wide range of actions without further privilege escalation, compromising confidentiality and integrity across the affected system.

Generated by OpenCVE AI on May 9, 2026 at 00:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Termix to version 2.1.0 or later, where the temp_token usage is correctly limited to the second‑factor flow.
  • Verify that all authentication endpoints reject temp_token for regular access, ensuring only the TOTP flow accepts it.
  • If an upgrade cannot be performed immediately, restrict access to the /users/login endpoint so that temp_token is not issued until a user explicitly requests a TOTP challenge, reducing the window in which the flaw can be abused.

Generated by OpenCVE AI on May 9, 2026 at 00:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 23:15:00 +0000

Type Values Removed Values Added
Description Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. Prior to version 2.1.0, /users/login issues a temporary JWT (temp_token) for TOTP-enabled accounts. That token carries a pendingTOTP state and should only be valid for the second-factor flow. However, the auth middleware accepts this token on regular authenticated endpoints. This effectively turns 2FA into single-factor (password) for impacted accounts. This issue has been patched in version 2.1.0.
Title Termix: Pending-TOTP temporary token can regenerate backup codes and neutralize TOTP
Weaknesses CWE-304
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-08T22:54:12.121Z

Reserved: 2026-04-27T13:55:58.693Z

Link: CVE-2026-42452

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T23:16:38.827

Modified: 2026-05-08T23:16:38.827

Link: CVE-2026-42452

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T00:30:21Z

Weaknesses