Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25060: CWE-599: Missing Validation of OpenSSL Certificate in OpenListTeam OpenList

0
High
VulnerabilityCVE-2026-25060cvecve-2026-25060cwe-599
Published: Mon Feb 02 2026 (02/02/2026, 22:26:42 UTC)
Source: CVE Database V5
Vendor/Project: OpenListTeam
Product: OpenList

Description

CVE-2026-25060 is a high-severity vulnerability in OpenList versions prior to 4. 1. 10 where TLS certificate verification is disabled by default for storage driver communications. This misconfiguration (TlsInsecureSkipVerify=true) allows attackers to perform Man-in-the-Middle (MitM) attacks by intercepting and manipulating encrypted traffic without detection. Exploitation requires network-level access such as ARP spoofing or rogue Wi-Fi access points. The vulnerability enables full decryption, data theft, and manipulation of storage operations, severely impacting confidentiality, integrity, and availability. The issue is fixed in OpenList version 4. 1. 10. European organizations using affected versions should urgently update and implement network protections to mitigate risk.

AI-Powered Analysis

AILast updated: 02/02/2026, 23:30:01 UTC

Technical Analysis

CVE-2026-25060 is a vulnerability in the OpenList software developed by OpenListTeam, specifically affecting versions prior to 4.1.10. The root cause is the default configuration in the internal configuration file (internal/conf/config.go) where the TlsInsecureSkipVerify setting is set to true. This setting disables TLS certificate verification for all storage driver communications, effectively allowing the system to accept any TLS certificate without validation. As a result, an attacker with network access can perform Man-in-the-Middle (MitM) attacks by intercepting or redirecting traffic through techniques such as ARP spoofing, rogue Wi-Fi access points, or compromised internal network devices. Because the system does not verify certificates, it will establish encrypted connections with attacker-controlled endpoints, enabling full decryption and manipulation of data in transit. This compromises the confidentiality, integrity, and availability of storage operations, potentially leading to data theft, unauthorized data modification, or disruption of services. The vulnerability has a CVSS v3.1 base score of 8.1, indicating high severity, with attack vector being network-based but requiring high attack complexity and no privileges or user interaction. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the ease of intercepting network traffic in many environments. The issue is resolved in OpenList version 4.1.10, where certificate verification is enabled by default.

Potential Impact

For European organizations, this vulnerability poses a critical risk to any infrastructure using OpenList versions prior to 4.1.10, particularly those handling sensitive or regulated data. The ability to intercept and manipulate storage communications can lead to exposure of confidential information, data integrity violations, and potential service disruptions. Sectors such as finance, healthcare, government, and critical infrastructure are especially vulnerable due to the sensitivity of their data and regulatory compliance requirements (e.g., GDPR). Additionally, organizations with distributed networks or remote offices using unsecured or public networks are at higher risk of network-level attacks facilitating exploitation. The vulnerability could also be leveraged for lateral movement within internal networks if attackers gain initial access. The high CVSS score reflects the severe impact on confidentiality, integrity, and availability, making this a significant threat to European enterprises relying on affected OpenList versions.

Mitigation Recommendations

1. Immediate upgrade to OpenList version 4.1.10 or later, where TLS certificate verification is enabled by default, is the primary and most effective mitigation. 2. Until the upgrade is applied, manually configure the TlsInsecureSkipVerify setting to false in the configuration files to enforce certificate validation. 3. Implement network segmentation and strict access controls to limit exposure of storage communication channels to trusted network segments only. 4. Deploy network security measures such as intrusion detection/prevention systems (IDS/IPS) to detect ARP spoofing, rogue access points, and other network-level attacks. 5. Use strong network encryption and VPNs for remote or wireless connections to reduce the risk of traffic interception. 6. Conduct regular network traffic monitoring and anomaly detection to identify suspicious activities indicative of MitM attacks. 7. Educate network administrators and security teams about the risks of disabled certificate verification and the importance of secure TLS configurations. 8. Review and audit all OpenList deployments to ensure no legacy versions remain in production environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-28T14:50:47.889Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813005f9fa50a62f63a3ee

Added to database: 2/2/2026, 11:15:17 PM

Last enriched: 2/2/2026, 11:30:01 PM

Last updated: 2/3/2026, 12:21:32 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats