Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25060: CWE-599: Missing Validation of OpenSSL Certificate in OpenListTeam OpenList

0
High
VulnerabilityCVE-2026-25060cvecve-2026-25060cwe-599
Published: Mon Feb 02 2026 (02/02/2026, 22:26:42 UTC)
Source: CVE Database V5
Vendor/Project: OpenListTeam
Product: OpenList

Description

OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, certificate verification is disabled by default for all storage driver communications. The TlsInsecureSkipVerify setting is default to true in the DefaultConfig() function in internal/conf/config.go. This vulnerability enables Man-in-the-Middle (MitM) attacks by disabling TLS certificate verification, allowing attackers to intercept and manipulate all storage communications. Attackers can exploit this through network-level attacks like ARP spoofing, rogue Wi-Fi access points, or compromised internal network equipment to redirect traffic to malicious endpoints. Since certificate validation is skipped, the system will unknowingly establish encrypted connections with attacker-controlled servers, enabling full decryption, data theft, and manipulation of all storage operations without triggering any security warnings. This vulnerability is fixed in 4.1.10.

AI-Powered Analysis

AILast updated: 02/10/2026, 10:47:46 UTC

Technical Analysis

CVE-2026-25060 is a vulnerability in the OpenList software developed by OpenListTeam, specifically affecting versions prior to 4.1.10. The root cause is the default configuration setting TlsInsecureSkipVerify=true in the DefaultConfig() function within internal/conf/config.go, which disables TLS certificate verification for all storage driver communications. This means that when OpenList establishes TLS connections to storage backends, it does not validate the authenticity of the server certificates, effectively trusting any presented certificate. This flaw enables attackers positioned on the network path—through techniques such as ARP spoofing, rogue Wi-Fi access points, or compromised internal network devices—to intercept and manipulate encrypted traffic between OpenList and its storage systems. Because certificate validation is skipped, the system will accept attacker-controlled TLS endpoints without warnings, allowing full decryption and modification of data in transit. The vulnerability impacts confidentiality (data theft), integrity (data manipulation), and availability (potential disruption of storage operations). The CVSS v3.1 base score is 8.1, reflecting high severity with network attack vector, high impact on confidentiality, integrity, and availability, and no required privileges or user interaction. Although no known exploits are reported in the wild yet, the ease of exploitation via common network attack methods makes this a significant risk. The issue is resolved in OpenList version 4.1.10 by enabling proper certificate verification by default.

Potential Impact

For European organizations, this vulnerability poses a serious risk to the security of storage communications within OpenList deployments. Organizations handling sensitive or regulated data—such as financial institutions, healthcare providers, and government agencies—could suffer data breaches resulting in loss of confidentiality and integrity. Attackers exploiting this vulnerability can intercept and manipulate critical storage data, potentially leading to data corruption, unauthorized data disclosure, or disruption of services relying on OpenList. The risk is heightened in environments with insufficient network segmentation or where internal networks are accessible to untrusted actors. Given the widespread use of OpenList in enterprise environments for storage management, the vulnerability could impact a broad range of sectors across Europe. Additionally, the ability to perform MitM attacks without detection undermines trust in encrypted communications, complicating incident response and forensic analysis.

Mitigation Recommendations

1. Immediate upgrade of OpenList installations to version 4.1.10 or later, where TLS certificate verification is enabled by default. 2. For environments where immediate upgrade is not feasible, manually set TlsInsecureSkipVerify to false in the configuration to enforce certificate validation. 3. Implement strict network segmentation and access controls to limit exposure of internal storage communication channels. 4. Deploy network monitoring and intrusion detection systems capable of identifying ARP spoofing, rogue access points, and other MitM attack vectors. 5. Use certificate pinning or mutual TLS authentication where possible to further harden storage communications. 6. Conduct regular security audits and penetration testing focused on network infrastructure and storage communication paths. 7. Educate network administrators on the risks of insecure TLS configurations and best practices for secure certificate management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-28T14:50:47.889Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813005f9fa50a62f63a3ee

Added to database: 2/2/2026, 11:15:17 PM

Last enriched: 2/10/2026, 10:47:46 AM

Last updated: 3/20/2026, 5:59:57 AM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses