CVE-2026-2215
rachelos WeRSS we-mp-rss JWT auth.py default key
CVSS Score
3.7
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was detected in rachelos WeRSS we-mp-rss up to 1.4.8. This issue affects some unknown processing of the file core/auth.py of the component JWT Handler. Performing a manipulation of the argument SECRET_KEY results in use of default cryptographic key. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is assessed as difficult. The exploit is now public and may be used.
| CWE | CWE-1394 |
| Vendor | rachelos |
| Product | werss we-mp-rss |
| Published | Feb 9, 2026 |
| Last Updated | Feb 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for rachelos werss we-mp-rss
Be the first to know when new low vulnerabilities affecting rachelos werss we-mp-rss are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
rachelos / WeRSS we-mp-rss
1.4.0 1.4.1 1.4.2 1.4.3 1.4.4 1.4.5 1.4.6 1.4.7 1.4.8
References
Credits
๐ din4 (VulDB User)