Dismissed
Permalink
CVE-2026-29023
7.3 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
by @mweinelt Activity log
- Created automatic suggestion
- @mweinelt removed package haskellPackages.shannon-fano
- @mweinelt dismissed
Keygraph Shannon Hard-coded Router API Key
Keygraph Shannon contains a hard-coded API key in its router configuration that, when the router component is enabled and exposed, allows network attackers to authenticate using the publicly known static key. An attacker able to reach the router port can proxy requests through the Shannon instance using the victim’s configured upstream provider API credentials, resulting in unauthorized API usage and potential disclosure of proxied request and response data. This vulnerability's general exploitability has been mitigated with the introduction of commit 023cc95.
References
- https://github.com/KeygraphHQ/shannon/pull/224/changes/023cc953db742602964b7826… mitigation
- https://www.vulncheck.com/advisories/keygraph-shannon-hard-coded-router-api-key third-party-advisory
- https://github.com/KeygraphHQ/shannon/issues/186 issue-tracking
- https://github.com/KeygraphHQ/shannon/pull/224 release-notes
Affected products
Shannon
- <commit 023cc95