HyperCloud versions 2.3.5 through 2.6.8 improperly allowed refresh tokens to be used directly for resource access and failed to invalidate previously issued access tokens when a refresh token was used. Because refresh tokens have a significantly longer lifetime (default one year), an authenticated client could use a refresh token in place of an access token to maintain long-term access without token rotation. Additionally, old access tokens remained valid after refresh, enabling concurrent or extended use beyond intended session boundaries. This vulnerability could allow prolonged unauthorized access if a token is disclosed.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://advisories.softiron.cloud/ |
Configurations
No configuration.
History
20 Feb 2026, 17:25
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-20 17:25
Updated : 2026-02-20 18:57
NVD link : CVE-2026-1842
Mitre link : CVE-2026-1842
CVE.ORG link : CVE-2026-1842
JSON object : View
Products Affected
No product.
CWE
CWE-613
Insufficient Session Expiration
