Dataease is an open source data visualization analysis tool. Prior to version 2.10.19, DataEase uses the MD5 hash of the user’s password as the JWT signing secret. This deterministic secret derivation allows an attacker to brute-force the admin’s password by exploiting unmonitored API endpoints that verify JWT tokens. The vulnerability has been fixed in v2.10.19. No known workarounds are available.
History

Thu, 22 Jan 2026 02:00:00 +0000

Type Values Removed Values Added
Description Dataease is an open source data visualization analysis tool. Prior to version 2.10.19, DataEase uses the MD5 hash of the user’s password as the JWT signing secret. This deterministic secret derivation allows an attacker to brute-force the admin’s password by exploiting unmonitored API endpoints that verify JWT tokens. The vulnerability has been fixed in v2.10.19. No known workarounds are available.
Title DataEase Vulnerable to Brute-Force Attack on Admin JWT Secret Derived from Password that Enables Full Account Takeover
Weaknesses CWE-522
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-22T01:42:11.514Z

Reserved: 2026-01-19T14:49:06.313Z

Link: CVE-2026-23958

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-22T02:15:52.627

Modified: 2026-01-22T02:15:52.627

Link: CVE-2026-23958

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.