Dataease is an open source data visualization analysis tool. Prior to version 2.10.19, DataEase uses the MD5 hash of the user’s password as the JWT signing secret. This deterministic secret derivation allows an attacker to brute-force the admin’s password by exploiting unmonitored API endpoints that verify JWT tokens. The vulnerability has been fixed in v2.10.19. No known workarounds are available.
References
| Link | Resource |
|---|---|
| https://github.com/dataease/dataease/security/advisories/GHSA-5wvm-4m4q-rh7j | Exploit Vendor Advisory |
| https://www.ox.security/blog/blog-dataease-cve-2026-23958-admin-takeover/ | Exploit Third Party Advisory |
Configurations
History
17 Feb 2026, 16:28
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CPE | cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:* | |
| References | () https://github.com/dataease/dataease/security/advisories/GHSA-5wvm-4m4q-rh7j - Exploit, Vendor Advisory | |
| References | () https://www.ox.security/blog/blog-dataease-cve-2026-23958-admin-takeover/ - Exploit, Third Party Advisory | |
| First Time |
Dataease dataease
Dataease |
26 Jan 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
22 Jan 2026, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-22 02:15
Updated : 2026-02-17 16:28
NVD link : CVE-2026-23958
Mitre link : CVE-2026-23958
CVE.ORG link : CVE-2026-23958
JSON object : View
Products Affected
dataease
- dataease
CWE
CWE-522
Insufficiently Protected Credentials
