Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-436v-8fw5-4mj8 | Local settings bypass config trust checks |
Wed, 15 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:jdx:mise:*:*:*:*:*:rust:*:* |
Wed, 08 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jdx
Jdx mise |
|
| Vendors & Products |
Jdx
Jdx mise |
Wed, 08 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mise manages dev tools like node, python, cmake, and terraform. From 2026.2.18 through 2026.4.5, mise loads trust-control settings from a local project .mise.toml before the trust check runs. An attacker who can place a malicious .mise.toml in a repository can make that same file appear trusted and then reach dangerous directives such as [env] _.source, templates, hooks, or tasks. | |
| Title | mise has a local settings bypass config trust checks | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T14:31:40.953Z
Reserved: 2026-04-03T02:15:39.281Z
Link: CVE-2026-35533
Updated: 2026-04-08T14:31:35.675Z
Status : Analyzed
Published: 2026-04-07T21:17:17.870
Modified: 2026-04-15T20:33:52.033
Link: CVE-2026-35533
No data.
OpenCVE Enrichment
Updated: 2026-04-16T02:45:06Z
Github GHSA