Description
An issue in Statping-ng v.0.91.0 allows an attacker to obtain sensitive information via a crafted request to the /api/users endpoint.
Published: 2026-02-11
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:statping-ng:statping-ng:0.91.0:*:*:*:*:*:*:*

Thu, 12 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Statping-ng
Statping-ng statping-ng
Vendors & Products Statping-ng
Statping-ng statping-ng

Wed, 11 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
Description An issue in Statping-ng v.0.91.0 allows an attacker to obtain sensitive information via a crafted request to the /api/users endpoint.
References

Subscriptions

Statping-ng Statping-ng
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-02-12T21:06:48.707Z

Reserved: 2024-02-19T00:00:00.000Z

Link: CVE-2024-26478

cve-icon Vulnrichment

Updated: 2026-02-12T21:06:42.653Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-11T20:16:06.637

Modified: 2026-02-26T21:22:53.350

Link: CVE-2024-26478

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-12T11:19:21Z

Weaknesses