CVE-2026-23958
Dataease is an open source data visualization analysis tool. Prior to version 2.10.19, DataEase uses the MD5 hash of the user’s password as the JWT signing secret. This deterministic secret derivation allows an attacker to brute-force the admin’s password by exploiting unmonitored API endpoints that verify JWT tokens. The vulnerability has been fixed in v2.10.19. No known workarounds are available.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23958.json, https://github.com/dataease/dataease/security/advisories/GHSA-5wvm-4m4q-rh7j, https://nvd.nist.gov/vuln/detail/CVE-2026-23958, https://www.ox.security/blog/blog-dataease-cve-2026-23958-admin-takeover/
