CVE-2026-23958

Dataease is an open source data visualization analysis tool. Prior to version 2.10.19, DataEase uses the MD5 hash of the user’s password as the JWT signing secret. This deterministic secret derivation allows an attacker to brute-force the admin’s password by exploiting unmonitored API endpoints that verify JWT tokens. The vulnerability has been fixed in v2.10.19. No known workarounds are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*

History

17 Feb 2026, 16:28

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*
References () https://github.com/dataease/dataease/security/advisories/GHSA-5wvm-4m4q-rh7j - () https://github.com/dataease/dataease/security/advisories/GHSA-5wvm-4m4q-rh7j - Exploit, Vendor Advisory
References () https://www.ox.security/blog/blog-dataease-cve-2026-23958-admin-takeover/ - () https://www.ox.security/blog/blog-dataease-cve-2026-23958-admin-takeover/ - Exploit, Third Party Advisory
First Time Dataease dataease
Dataease

26 Jan 2026, 17:16

Type Values Removed Values Added
References
  • () https://www.ox.security/blog/blog-dataease-cve-2026-23958-admin-takeover/ -

22 Jan 2026, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-22 02:15

Updated : 2026-02-17 16:28


NVD link : CVE-2026-23958

Mitre link : CVE-2026-23958

CVE.ORG link : CVE-2026-23958


JSON object : View

Products Affected

dataease

  • dataease
CWE
CWE-522

Insufficiently Protected Credentials