CVE-2026-28432
Plain English Summary
AI-powered analysis for quick understanding
An attacker can bypass security checks that verify the authenticity of messages sent between Misskey servers, which could allow them to send fake or malicious content. This vulnerability affects all Misskey servers, regardless of whether they are set up to communicate with other servers or not, and it has been fixed in the latest version.
Technical Description
Misskey is an open source, federated social media platform. All Misskey servers prior to 2026.3.1 contain a vulnerability that allows bypassing HTTP signature verification. Although this is a vulnerability related to federation, it affects all servers regardless of whether federation is enabled or disabled. This vulnerability is fixed in 2026.3.1.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 10, 2026
29 days ago
Last Modified
Mar 13, 2026
25 days ago
Vendor
misskey
Product
misskey
Related Vulnerabilities
This vulnerability allows an attacker to import other users' data from Misskey servers, but they need to know the specific ID of the file they want to access. While the risk is considered low, it still poses a potential privacy issue for users on affected versions of the platform.
This vulnerability allows attackers to access sensitive data on Misskey servers that they shouldn't be able to see, potentially leading to a major data breach. It affects all versions from 8.45.0 up to, but not including, 2026.3.1, regardless of whether the server's federation feature is turned on.