CVE-2026-46419
Description
Yubico webauthn-server-core (aka java-webauthn-server) 2.8.0 before 2.8.2 incorrectly checks a function's return value in the second factor flow, leading to impersonation.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Yubico webauthn-server-core 2.8.0–2.8.1 incorrectly validates a function return in the second-factor flow, allowing user impersonation.
Vulnerability
Overview
CVE-2026-46419 affects Yubico's webauthn-server-core (java-webauthn-server) versions 2.8.0 through 2.8.1, and several alpha/RC releases. The bug occurs when the server processes a second-factor (non-passkey) WebAuthn authentication attempt. The function responsible for checking the user's credential presence returns a value that is not properly validated, allowing the server to proceed with authentication even when the target user has no registered credential. [1]
Attack
Vector and Prerequisites
Exploitation requires the attacker to have an existing account on the relying party's system. The relying party must use usernames to identify users and allow authentication attempts against usernames that lack a WebAuthn user handle in the credential repository. Additionally, the implementation must use the second-factor flow rather than the passkey flow. Under these conditions, an attacker can authenticate as any user who does not have a registered WebAuthn credential. [1]
Impact
A successful attack results in user impersonation: the attacker gains access to the target user's account without possessing their credentials. This breaks the authentication guarantee provided by WebAuthn and can lead to unauthorized data access, privilege escalation, or further compromise within the relying party's application. [1]
Mitigation
Yubico released version 2.8.2 of webauthn-server-core to fix the return-value check. All affected production versions (2.8.0 through 2.8.1) and pre-release versions listed in the advisory should be updated immediately. Users still on versions 2.6.0 or 2.7.0 are not affected. No Yubico hardware products are impacted. [1] [2]
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: >=2.8.0,<2.8.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.