LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-31839

CVE-2026-31839 - Vulnerability Analysis

HighCVSS: 8.2

Last Updated: March 11, 2026

Striae - Authentication Bypass

Published: March 11, 2026Updated: March 11, 2026

Overview

Striae < 3.0.0 contains an integrity bypass caused by trusting manifest hash fields modifiable with package content in the digital confirmation workflow, letting attackers bypass integrity checks, exploit requires tampered confirmation packages.

Severity & Score

Severity: High
CVSS Score: 8.2
EPSS Score: 0.6%(Probability of exploitation in next 30 days)

Impact

Attackers can bypass integrity checks, allowing tampered packages to be accepted, compromising data integrity.

Mitigation

Update to version 3.0.0 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 11, 2026

🟠 CVE-2026-31839 - High (8.2) Striae is a firearms examiner's comparison companion. A high-severity integrity bypass vulnerability existed in Striae's digital confirmation workflow prior to v3.0.0. Hash-only validation trusted manifest hash fields that could be modified togeth... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-31839/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-31839
Severity
High
CVSS Score
8.2
Type
broken_authentication
Status
new
EPSS
0.6%
Social Posts
1

CWE

  • CWE-354

CVSS Metrics

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

EPSS Score

0.6%Probability of exploitation in the next 30 days