Unrated severityOSV Advisory· Published Jan 22, 2026· Updated Jan 26, 2026
DataEase Vulnerable to Brute-Force Attack on Admin JWT Secret Derived from Password that Enables Full Account Takeover
CVE-2026-23958
Description
Dataease is an open source data visualization analysis tool. Prior to version 2.10.19, DataEase uses the MD5 hash of the user’s password as the JWT signing secret. This deterministic secret derivation allows an attacker to brute-force the admin’s password by exploiting unmonitored API endpoints that verify JWT tokens. The vulnerability has been fixed in v2.10.19. No known workarounds are available.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/dataease/dataease/security/advisories/GHSA-5wvm-4m4q-rh7jmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.