CVE-2026-7018 PUBLISHED

Datavane Datavines JWT Token TokenManager.java hard-coded key

Assigner: VulDB
Reserved: 25.04.2026 Published: 26.04.2026 Updated: 26.04.2026

A vulnerability was determined in Datavane Datavines up to 13607645e14a4982468cfdbcf75c85cde63bae71. The affected element is an unknown function of the file datavines-core/src/main/java/io/datavines/core/utils/TokenManager.java of the component JWT Token Handler. Executing a manipulation of the argument tokenSecret can lead to use of hard-coded cryptographic key . The attack can be executed remotely. The attack requires a high level of complexity. The exploitability is described as difficult. The exploit has been publicly disclosed and may be utilized. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. This patch is called e540d6dc04e2e6ad11907fb655f3728a13e7b939. It is advisable to implement a patch to correct this issue. The project was informed of the problem early through a pull request but has not reacted yet.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.3

Product Status

Vendor Datavane
Product Datavines
Versions
  • Version 13607645e14a4982468cfdbcf75c85cde63bae71 is affected

Credits

  • anch0r (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Use of Hard-coded Cryptographic Key CWE
  • Key Management Error CWE