CVE-2026-1842
HyperCloud Improper Refresh Token Validation and Access Token Invalidation Allows Long-Term Unauthorized Access
HyperCloud versions 2.3.5 through 2.6.8 improperly allowed refresh tokens to be used directly for resource access and failed to invalidate previously issued access tokens when a refresh token was used. Because refresh tokens have a significantly longer lifetime (default one year), an authenticated client could use a refresh token in place of an access token to maintain long-term access without token rotation. Additionally, old access tokens remained valid after refresh, enabling concurrent or extended use beyond intended session boundaries. This vulnerability could allow prolonged unauthorized access if a token is disclosed.
| CWE | CWE-613 |
| Vendor | softiron |
| Product | hypercloud |
| Published | Feb 20, 2026 |
| Last Updated | Feb 20, 2026 |
Get instant alerts for softiron hypercloud
Be the first to know when new unknown vulnerabilities affecting softiron hypercloud are published โ delivered to Slack, Telegram or Discord.