Medium severity5.9NVD Advisory· Published May 5, 2026· Updated May 12, 2026
CVE-2026-28510
CVE-2026-28510
Description
eLabFTW is an open source electronic lab notebook. In elabftw versions through 5.4.1, the login flow did not reliably preserve the multi-factor authentication state across authentication steps. Under certain conditions, an attacker with valid primary credentials could complete authentication with an attacker-controlled TOTP secret and bypass the additional factor. This could result in unauthorized account access. This issue is fixed in version 5.4.2.
Affected products
2Patches
18b7a575aef12cleanup: login/mfa: remove useless request fallback
1 file changed · +1 −1
src/Controllers/LoginController.php+1 −1 modified@@ -358,7 +358,7 @@ private function getAuthService(): AuthInterface // MFA AUTH case AuthType::Mfa: return new Mfa( - new MfaHelper($this->Session->get('mfa_secret') ?? $this->Request->request->get('mfa_secret')), + new MfaHelper($this->Session->get('mfa_secret')), $this->Session->get('auth_userid'), $this->Request->request->getAlnum('mfa_code'), );
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/elabftw/elabftw/commit/8b7a575aef128870861187eaa2b2f0f08654ecf9nvdPatch
- github.com/elabftw/elabftw/security/advisories/GHSA-x5wv-c9q4-fj65nvdMitigationVendor Advisory
News mentions
0No linked articles in our index yet.