A vulnerability was detected in rachelos WeRSS we-mp-rss up to 1.4.8. This issue affects some unknown processing of the file core/auth.py of the component JWT Handler. Performing a manipulation of the argument SECRET_KEY results in use of default cryptographic key. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is assessed as difficult. The exploit is now public and may be used.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Feb 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in rachelos WeRSS we-mp-rss up to 1.4.8. This issue affects some unknown processing of the file core/auth.py of the component JWT Handler. Performing a manipulation of the argument SECRET_KEY results in use of default cryptographic key. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is assessed as difficult. The exploit is now public and may be used. | |
| Title | rachelos WeRSS we-mp-rss JWT auth.py default key | |
| Weaknesses | CWE-1394 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-09T04:32:06.678Z
Reserved: 2026-02-08T08:30:03.928Z
Link: CVE-2026-2215
No data.
Status : Received
Published: 2026-02-09T05:16:25.100
Modified: 2026-02-09T05:16:25.100
Link: CVE-2026-2215
No data.
OpenCVE Enrichment
No data.