Skip to content

Commit b5e8c2c

Browse files
1 parent d22f358 commit b5e8c2c

2 files changed

Lines changed: 122 additions & 5 deletions

File tree

advisories/unreviewed/2026/01/GHSA-43rr-x62x-q96w/GHSA-43rr-x62x-q96w.json renamed to advisories/github-reviewed/2026/01/GHSA-43rr-x62x-q96w/GHSA-43rr-x62x-q96w.json

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-43rr-x62x-q96w",
4-
"modified": "2026-01-20T03:30:28Z",
4+
"modified": "2026-01-21T15:47:33Z",
55
"published": "2026-01-20T03:30:28Z",
66
"aliases": [
77
"CVE-2026-1195"
88
],
9+
"summary": "MineAdmin improperly refreshes tokens",
910
"details": "A weakness has been identified in MineAdmin 1.x/2.x. This impacts the function refresh of the file /system/refresh of the component JWT Token Handler. This manipulation causes insufficient verification of data authenticity. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.",
1011
"severity": [
1112
{
@@ -14,10 +15,30 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "Packagist",
25+
"name": "mineadmin/mineadmin"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"last_affected": "2.0.3"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
@@ -27,6 +48,10 @@
2748
"type": "WEB",
2849
"url": "https://github.com/SourByte05/MineAdmin-Vulnerability/issues/4"
2950
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/mineadmin/mineadmin"
54+
},
3055
{
3156
"type": "WEB",
3257
"url": "https://vuldb.com/?ctiid.341780"
@@ -45,8 +70,8 @@
4570
"CWE-345"
4671
],
4772
"severity": "LOW",
48-
"github_reviewed": false,
49-
"github_reviewed_at": null,
73+
"github_reviewed": true,
74+
"github_reviewed_at": "2026-01-21T15:47:33Z",
5075
"nvd_published_at": "2026-01-20T01:15:56Z"
5176
}
5277
}
Lines changed: 92 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,92 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-ggff-9mj3-7246",
4+
"modified": "2026-01-21T15:47:44Z",
5+
"published": "2026-01-21T15:47:44Z",
6+
"aliases": [
7+
"CVE-2026-0895"
8+
],
9+
"summary": "mailqueue TYPO3 extension affected by Insecure Deserialization",
10+
"details": "## Description\n\nThe extension extends TYPO3’s FileSpool component, which was vulnerable to Insecure Deserialization prior to [TYPO3-CORE-SA-2026-004](https://typo3.org/security/advisory/typo3-core-sa-2026-004). Since the related fix is overwritten by the extension, using the extension with a patched TYPO3 core version still allows for Insecure Deserialization, because the affected vulnerable code was extracted from TYPO3 core to the extension.\n\nMore information about this vulnerability can be found in the related TYPO3 Core Security Advisory [TYPO3-CORE-SA-2026-004](https://typo3.org/security/advisory/typo3-core-sa-2026-004).",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "cpsit/typo3-mailqueue"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "0.4.3"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Packagist",
40+
"name": "cpsit/typo3-mailqueue"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "0.5.0"
48+
},
49+
{
50+
"fixed": "0.5.1"
51+
}
52+
]
53+
}
54+
]
55+
}
56+
],
57+
"references": [
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/CPS-IT/mailqueue/security/advisories/GHSA-ggff-9mj3-7246"
61+
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0895"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://github.com/CPS-IT/mailqueue/commit/12a0a35027bb5609917790a94e43bbf117abf733"
69+
},
70+
{
71+
"type": "WEB",
72+
"url": "https://github.com/CPS-IT/mailqueue/commit/fd09aa4e1a751551bae4b228bee814e22f2048db"
73+
},
74+
{
75+
"type": "PACKAGE",
76+
"url": "https://github.com/CPS-IT/mailqueue"
77+
},
78+
{
79+
"type": "WEB",
80+
"url": "https://typo3.org/security/advisory/typo3-ext-sa-2026-001"
81+
}
82+
],
83+
"database_specific": {
84+
"cwe_ids": [
85+
"CWE-502"
86+
],
87+
"severity": "MODERATE",
88+
"github_reviewed": true,
89+
"github_reviewed_at": "2026-01-21T15:47:44Z",
90+
"nvd_published_at": "2026-01-20T08:16:01Z"
91+
}
92+
}

0 commit comments

Comments
 (0)