Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 03 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cert/cc
Cert/cc cveclient/encrypt-storage.js |
|
| Vendors & Products |
Cert/cc
Cert/cc cveclient/encrypt-storage.js |
Thu, 02 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials. | |
| Title | Private Key stored as extractable in browser IndexeDB | |
| Weaknesses | CWE-522 | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-04-03T13:51:22.012Z
Reserved: 2026-04-02T20:09:50.057Z
Link: CVE-2026-35467
Updated: 2026-04-03T13:49:18.061Z
Status : Awaiting Analysis
Published: 2026-04-02T21:16:40.810
Modified: 2026-04-03T16:10:23.730
Link: CVE-2026-35467
No data.
OpenCVE Enrichment
Updated: 2026-04-03T21:17:11Z