Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wf93-3ghh-h389 | OpenList has Insecure TLS Default Configuration |
Mon, 23 Feb 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oplist
Oplist openlist |
|
| CPEs | cpe:2.3:a:oplist:openlist:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Oplist
Oplist openlist |
Wed, 04 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openlistteam
Openlistteam openlist |
|
| Vendors & Products |
Openlistteam
Openlistteam openlist |
Mon, 02 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, certificate verification is disabled by default for all storage driver communications. The TlsInsecureSkipVerify setting is default to true in the DefaultConfig() function in internal/conf/config.go. This vulnerability enables Man-in-the-Middle (MitM) attacks by disabling TLS certificate verification, allowing attackers to intercept and manipulate all storage communications. Attackers can exploit this through network-level attacks like ARP spoofing, rogue Wi-Fi access points, or compromised internal network equipment to redirect traffic to malicious endpoints. Since certificate validation is skipped, the system will unknowingly establish encrypted connections with attacker-controlled servers, enabling full decryption, data theft, and manipulation of all storage operations without triggering any security warnings. This vulnerability is fixed in 4.1.10. | |
| Title | OpenList Insecure TLS Default Configuration | |
| Weaknesses | CWE-599 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-04T16:53:31.990Z
Reserved: 2026-01-28T14:50:47.889Z
Link: CVE-2026-25060
Updated: 2026-02-04T15:54:29.169Z
Status : Analyzed
Published: 2026-02-02T23:16:08.913
Modified: 2026-02-23T17:35:00.207
Link: CVE-2026-25060
No data.
OpenCVE Enrichment
Updated: 2026-04-18T00:30:25Z
Github GHSA