Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qpv2-rwc8-c993 | Netmaker does not verify JWT signatures for host tokens |
Wed, 29 Apr 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Netmaker Host JWT Signature Verification Bypass |
Tue, 28 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-306 |
Tue, 28 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Netmaker Host JWT Signature Verification Bypass | |
| Weaknesses | CWE-306 |
Tue, 28 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-347 | |
| References |
| |
| Metrics |
cvssV3_1
|
Tue, 28 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gravitl
Gravitl netmaker |
|
| Vendors & Products |
Gravitl
Gravitl netmaker |
Tue, 28 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authentication Bypass vulnerability exists in Netmaker versions prior to 1.5.0. The VerifyHostToken function in logic/jwts.go fails to validate the JWT signature when verifying host tokens. An attacker can forge a JWT signed with any arbitrary key and use it to impersonate any host in the network, gaining access to sensitive information | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-28T17:34:42.863Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-38651
No data.
Status : Awaiting Analysis
Published: 2026-04-28T16:16:13.443
Modified: 2026-04-28T20:23:20.703
Link: CVE-2026-38651
No data.
OpenCVE Enrichment
Updated: 2026-04-29T02:30:07Z
Github GHSA