Description
A vulnerability was determined in Datavane Datavines up to 13607645e14a4982468cfdbcf75c85cde63bae71. The affected element is an unknown function of the file datavines-core/src/main/java/io/datavines/core/utils/TokenManager.java of the component JWT Token Handler. Executing a manipulation of the argument tokenSecret can lead to use of hard-coded cryptographic key
. The attack can be executed remotely. The attack requires a high level of complexity. The exploitability is described as difficult. The exploit has been publicly disclosed and may be utilized. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. This patch is called e540d6dc04e2e6ad11907fb655f3728a13e7b939. It is advisable to implement a patch to correct this issue. The project was informed of the problem early through a pull request but has not reacted yet.
Published: 2026-04-26
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality compromise
Action: Patch
AI Analysis

Impact

The vulnerability in Datavane Datavines allows an attacker to manipulate the tokenSecret argument within the JWT token handler, causing the application to use a hard‑coded cryptographic key. This flaw represents a weakness in key management (CWE-320 and CWE-321) that can enable unauthorized decryption or generation of tokens, potentially exposing sensitive information and granting elevated privileges to the attacker. The impact is a loss of confidentiality and possible unauthorized access.

Affected Systems

Datavane Datavines up to commit 13607645e14a4982468cfdbcf75c85cde63bae71 is affected. No specific version list is available because the project uses a rolling release model.

Risk and Exploitability

The CVSS score of 6.3 indicates a moderate severity, while the EPSS score of less than 1% points to a very low likelihood of exploitation. The attack vector is remote, but the complexity and difficulty of exploitation are high, and the vulnerability is not currently listed in the CISA KEV catalog. Attackers would need to craft a payload that modifies tokenSecret and trigger the vulnerable code path, which is difficult and not straightforward.

Generated by OpenCVE AI on April 28, 2026 at 05:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch commit e540d6dc04e2e6ad11907fb655f3728a13e7b939 to fix the hard‑coded key handling.
  • Upgrade to a newer release of Datavines that incorporates the patch, or merge the change into your local fork if a release is not yet available.
  • Ensure that tokenSecret values are validated and not overridden by potentially malicious input; enforce strict configuration management.

Generated by OpenCVE AI on April 28, 2026 at 05:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Datavane
Datavane datavines
Vendors & Products Datavane
Datavane datavines

Mon, 27 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 26 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Datavane Datavines up to 13607645e14a4982468cfdbcf75c85cde63bae71. The affected element is an unknown function of the file datavines-core/src/main/java/io/datavines/core/utils/TokenManager.java of the component JWT Token Handler. Executing a manipulation of the argument tokenSecret can lead to use of hard-coded cryptographic key . The attack can be executed remotely. The attack requires a high level of complexity. The exploitability is described as difficult. The exploit has been publicly disclosed and may be utilized. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. This patch is called e540d6dc04e2e6ad11907fb655f3728a13e7b939. It is advisable to implement a patch to correct this issue. The project was informed of the problem early through a pull request but has not reacted yet.
Title Datavane Datavines JWT Token TokenManager.java hard-coded key
Weaknesses CWE-320
CWE-321
References
Metrics cvssV2_0

{'score': 5.1, 'vector': 'AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 5.6, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 5.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Datavane Datavines
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T17:02:44.468Z

Reserved: 2026-04-25T10:32:08.296Z

Link: CVE-2026-7018

cve-icon Vulnrichment

Updated: 2026-04-27T17:02:31.518Z

cve-icon NVD

Status : Deferred

Published: 2026-04-26T04:16:09.110

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-7018

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:30:23Z

Weaknesses