CVE-2026-45091 - Vulnerability Analysis
CriticalCVSS: 9.1Last Updated: May 12, 2026
sealed-env - Information Disclosure
Overview
sealed-env 0.1.0-alpha.1 through 0.1.0-alpha.3 contains an information disclosure vulnerability caused by embedding the operator's literal TOTP secret in base64-encoded JWS payload, letting attackers decode tokens to extract TOTP secrets, exploit requires access to minted tokens.
Severity & Score
Impact
Attackers with access to tokens can extract TOTP secrets, compromising multi-factor authentication and potentially leading to account takeover.
Mitigation
Update to version 0.1.0-alpha.4 or later.
Social Media Activity(2 posts)
š“ CVE-2026-45091 - Critical (9.1) sealed-env is a cross-stack, zero-trust secret management library for Node.js and Java/Spring Boot. In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every... š https://www.thehackerwire.com/vulnerability/CVE-2026-45091/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš“ CVE-2026-45091 - Critical (9.1) sealed-env is a cross-stack, zero-trust secret management library for Node.js and Java/Spring Boot. In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every... š https://www.thehackerwire.com/vulnerability/CVE-2026-45091/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-45091
- Severity
- Critical
- CVSS Score
- 9.1
- Type
- information_disclosure
- Status
- new
- EPSS
- 0.0%
- Social Posts
- 2
CWE
- CWE-200
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N