CVE-2026-28678

Critical
|9.1
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to steal user authentication tokens stored in cookies, potentially gaining unauthorized access to accounts on the DSA Study Hub. It occurs because these tokens were not securely protected, making it easier for attackers to exploit this weakness if they can intercept the cookies.

Technical Description

DSA Study Hub is an interactive educational web application. Prior to commit d527fba, the user authentication system in server/routes/auth.js was found to be vulnerable to Insufficiently Protected Credentials. Authentication tokens (JWTs) were stored in HTTP cookies without cryptographic protection of the payload. This issue has been patched via commit d527fba.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$6,000($5K-$15K)
Vendor Response
Grade APatched in 4 days

Quick Information

Published

Mar 7, 2026

about 1 month ago

Last Modified

Mar 11, 2026

27 days ago

Vendor

toxicbishop

Product

dsa study hub