Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 09 Feb 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in rachelos WeRSS we-mp-rss up to 1.4.8. This issue affects some unknown processing of the file core/auth.py of the component JWT Handler. Performing a manipulation of the argument SECRET_KEY results in use of default cryptographic key. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is assessed as difficult. The exploit is now public and may be used. | |
| Title | rachelos WeRSS we-mp-rss JWT auth.py default key | |
| Weaknesses | CWE-1394 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-09T04:32:06.678Z
Reserved: 2026-02-08T08:30:03.928Z
Link: CVE-2026-2215
No data.
Status : Received
Published: 2026-02-09T05:16:25.100
Modified: 2026-02-09T05:16:25.100
Link: CVE-2026-2215
No data.
OpenCVE Enrichment
No data.