Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26273: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in idno known

0
Critical
VulnerabilityCVE-2026-26273cvecve-2026-26273cwe-200cwe-640
Published: Fri Feb 13 2026 (02/13/2026, 21:45:41 UTC)
Source: CVE Database V5
Vendor/Project: idno
Product: known

Description

CVE-2026-26273 is a critical vulnerability in the Known social publishing platform versions prior to 1. 6. 3. It exposes password reset tokens in a hidden HTML input field on the password reset page, allowing unauthenticated attackers to retrieve these tokens by simply querying a user's email. This flaw enables full account takeover without needing access to the victim's email inbox. The vulnerability is due to broken authentication and sensitive information exposure (CWE-200 and CWE-640). It has a CVSS score of 9. 8, indicating critical severity. The issue is fixed in version 1. 6.

AI-Powered Analysis

AILast updated: 02/13/2026, 22:18:30 UTC

Technical Analysis

CVE-2026-26273 affects the Known social publishing platform (product: known, vendor: idno) in versions prior to 1.6.3. The vulnerability arises from the exposure of password reset tokens within a hidden HTML input field on the password reset page. When a user initiates a password reset, the application embeds the reset token in the page's HTML source code, which is accessible to anyone who can submit the password reset form with a target user's email address. This design flaw violates secure authentication principles by leaking sensitive tokens to unauthenticated actors, enabling them to bypass the need for email inbox access. Exploiting this vulnerability allows an attacker to perform a full account takeover (ATO), compromising confidentiality, integrity, and availability of user accounts. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information) and CWE-640 (Weak Password Recovery Mechanism). The CVSS v3.0 base score of 9.8 reflects the ease of exploitation (network vector, no privileges or user interaction required) and the critical impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability's nature makes it highly exploitable. The issue was publicly disclosed on February 13, 2026, and fixed in Known version 1.6.3. Organizations running affected versions should prioritize patching and audit their password reset implementations to ensure tokens are never exposed in client-side code.

Potential Impact

For European organizations using the Known platform, this vulnerability poses a severe risk of account compromise without requiring access to users' email accounts. Attackers can hijack user accounts, potentially leading to unauthorized content publication, data leakage, reputational damage, and further lateral attacks within the organization. Given Known's use in social publishing, compromised accounts could be leveraged to spread misinformation or malicious content. The critical nature of the vulnerability means that any organization relying on Known for internal or public-facing content management is at risk of significant operational disruption and data breaches. Additionally, GDPR implications arise from unauthorized access to personal data, potentially resulting in regulatory penalties and loss of customer trust. The ease of exploitation and lack of required authentication make this a high-priority threat for European entities using affected versions.

Mitigation Recommendations

Immediate upgrade to Known version 1.6.3 or later is the primary mitigation step to remediate this vulnerability. Organizations should audit their password reset workflows to ensure that sensitive tokens are never exposed in client-side code or HTML. Implement server-side validation and token handling that restricts token visibility to authenticated sessions only. Employ rate limiting and CAPTCHA protections on password reset endpoints to prevent automated enumeration of user emails. Conduct thorough security testing on authentication and password recovery features to detect similar flaws. Additionally, monitor logs for suspicious password reset requests and consider notifying users of password reset activities. For organizations unable to upgrade immediately, temporarily disabling password reset functionality or restricting access to the reset page via IP whitelisting can reduce risk. Finally, educate users on recognizing phishing attempts and encourage strong, unique passwords to mitigate downstream risks from account compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-12T17:10:53.413Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 698f9fdcc9e1ff5ad86c396f

Added to database: 2/13/2026, 10:04:12 PM

Last enriched: 2/13/2026, 10:18:30 PM

Last updated: 2/14/2026, 1:11:08 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats