Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24058: CWE-289: Authentication Bypass by Alternate Name in charmbracelet soft-serve

0
High
VulnerabilityCVE-2026-24058cvecve-2026-24058cwe-289
Published: Thu Jan 22 2026 (01/22/2026, 22:01:22 UTC)
Source: CVE Database V5
Vendor/Project: charmbracelet
Product: soft-serve

Description

CVE-2026-24058 is a critical authentication bypass vulnerability in charmbracelet soft-serve versions 0. 11. 2 and below. The flaw allows an attacker to impersonate any user, including administrators, by exploiting the SSH handshake process. Specifically, the vulnerability arises because the victim's public key is 'offered' during the SSH handshake and the user identity is stored in the session context prematurely. If the attacker fails to authenticate with the victim's key but then authenticates with their own valid key, the session context is not cleared, allowing the attacker to assume the victim's identity. This vulnerability has a high CVSS 4. 0 score of 8. 1 and does not require authentication or user interaction to exploit. The issue was fixed in version 0.

AI-Powered Analysis

AILast updated: 01/30/2026, 10:01:14 UTC

Technical Analysis

The vulnerability CVE-2026-24058 affects charmbracelet soft-serve, a self-hostable Git server used primarily via the command line. Versions prior to 0.11.3 contain a critical authentication bypass flaw categorized under CWE-289 (Authentication Bypass). The root cause lies in the SSH handshake process where the victim's public key is 'offered' and the user identity is prematurely stored in the session context. If the attacker fails to authenticate with the victim's key but subsequently authenticates with their own valid key, the session context is not cleared, resulting in the attacker being able to impersonate the victim, including administrative users. This bypass does not require any prior authentication or user interaction, making it highly exploitable remotely. The vulnerability impacts confidentiality, integrity, and availability by allowing unauthorized access and potential control over the Git server, which can lead to code tampering, data leakage, or disruption of development pipelines. The issue was publicly disclosed on January 22, 2026, and fixed in version 0.11.3. No known exploits are currently reported in the wild, but the vulnerability's nature and high CVSS score (8.1) indicate a significant risk. Organizations relying on soft-serve for source code management should prioritize patching and review SSH session handling to prevent exploitation.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, especially for those using soft-serve as part of their software development lifecycle. Unauthorized impersonation of users, including administrators, can lead to unauthorized code commits, insertion of malicious code, exposure of sensitive intellectual property, and disruption of development workflows. This can compromise the integrity of software products and services, potentially leading to downstream supply chain attacks. Additionally, attackers gaining admin-level access can manipulate repository settings, delete repositories, or exfiltrate sensitive data. The breach of trust in source code repositories can have regulatory and compliance implications under GDPR and other data protection laws. The vulnerability's remote exploitability without authentication increases the risk of widespread attacks, particularly targeting organizations with critical infrastructure or those involved in sensitive sectors such as finance, healthcare, and government services within Europe.

Mitigation Recommendations

1. Immediate upgrade of all soft-serve instances to version 0.11.3 or later to apply the official fix. 2. Conduct a thorough audit of SSH key management policies to ensure no unauthorized keys are present and that key usage is strictly controlled. 3. Review and harden SSH session handling configurations to ensure session contexts are properly cleared after failed authentication attempts. 4. Implement network-level access controls to restrict SSH access to trusted IP ranges and use multi-factor authentication where possible. 5. Monitor Git server logs for unusual authentication patterns or repeated failed attempts followed by successful logins that could indicate exploitation attempts. 6. Educate development and operations teams about the vulnerability and encourage prompt reporting of suspicious activities. 7. Consider deploying intrusion detection systems tailored to detect anomalous SSH handshake behaviors. 8. If feasible, isolate critical repositories or sensitive projects on separate instances or platforms until the patch is applied and verified.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-20T22:30:11.779Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6972a2c84623b1157c932849

Added to database: 1/22/2026, 10:20:56 PM

Last enriched: 1/30/2026, 10:01:14 AM

Last updated: 2/7/2026, 1:20:14 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats