Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23996: CWE-208: Observable Timing Discrepancy in Athroniaeth fastapi-api-key

0
Low
VulnerabilityCVE-2026-23996cvecve-2026-23996cwe-208
Published: Wed Jan 21 2026 (01/21/2026, 22:29:24 UTC)
Source: CVE Database V5
Vendor/Project: Athroniaeth
Product: fastapi-api-key

Description

CVE-2026-23996 is a timing side-channel vulnerability in the fastapi-api-key library version prior to 1. 1. 0. The verify_key() function applies a random delay only on verification failures, enabling attackers to statistically distinguish valid API keys by measuring response times. This can accelerate brute-force or enumeration attacks against API keys. The vulnerability affects all users relying on verify_key() for authentication before the patch. The fix in version 1. 1. 0 applies uniform random delays to all responses, removing timing discrepancies. Workarounds include adding fixed delays or random jitter at the application level and implementing rate limiting.

AI-Powered Analysis

AILast updated: 01/21/2026, 23:05:19 UTC

Technical Analysis

The vulnerability CVE-2026-23996 affects the fastapi-api-key library, a backend-agnostic API key authentication system widely used in FastAPI applications. In versions prior to 1.1.0, the verify_key() function contains a timing side-channel flaw where a random delay is only introduced on failed API key verification attempts. This inconsistent delay allows an attacker to perform statistical analysis on response latencies to determine whether a given key_id corresponds to a valid API key. By sending numerous requests and measuring response times, an adversary can distinguish valid keys from invalid ones, significantly reducing the effort needed to brute-force or enumerate API keys. The vulnerability is classified under CWE-208 (Observable Timing Discrepancy). The patch introduced in version 1.1.0 mitigates this by applying a uniform random delay to all verification responses, regardless of success or failure, thus eliminating timing differences that could be exploited. Additional mitigations include adding fixed delays or random jitter at the application level and implementing rate limiting to reduce the feasibility of timing attacks. The CVSS v3.1 score is 3.7, reflecting a low severity due to the high attack complexity and limited confidentiality impact. No known exploits are reported in the wild as of now.

Potential Impact

For European organizations, this vulnerability could facilitate accelerated brute-force or enumeration attacks against API keys used in FastAPI applications that rely on the fastapi-api-key library prior to version 1.1.0. Successful enumeration of valid API keys can lead to unauthorized access to protected APIs, potentially exposing sensitive data or allowing unauthorized operations. Although the confidentiality impact is rated low, the risk increases in environments where API keys grant access to critical systems or sensitive personal data, which is subject to strict regulatory frameworks such as GDPR. The timing attack requires network access but no authentication or user interaction, making it feasible for remote attackers. If exploited, it could undermine trust in API security and lead to compliance issues. The vulnerability's impact is more pronounced in sectors heavily reliant on API integrations, such as finance, healthcare, and government services within Europe.

Mitigation Recommendations

European organizations should immediately upgrade the fastapi-api-key library to version 1.1.0 or later to apply the official patch that enforces uniform random delays on all verification attempts. Until the upgrade is possible, implement application-level mitigations such as adding fixed delays or random jitter to all authentication responses, regardless of success or failure, to mask timing differences. Additionally, enforce strict rate limiting on API endpoints to reduce the feasibility of statistical timing analysis by limiting the number of requests an attacker can make in a given timeframe. Monitor API usage logs for unusual patterns indicative of enumeration attempts. Consider implementing multi-factor authentication or additional layers of API security, such as IP whitelisting or mutual TLS, to further reduce risk. Regularly audit API key management practices, including key rotation and revocation policies, to minimize exposure. Finally, educate developers about timing side-channel risks when designing authentication mechanisms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-19T18:49:20.658Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697158504623b1157cf11dbd

Added to database: 1/21/2026, 10:50:56 PM

Last enriched: 1/21/2026, 11:05:19 PM

Last updated: 1/21/2026, 11:58:47 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats