Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28431: CWE-285: Improper Authorization in misskey-dev misskey

0
Critical
VulnerabilityCVE-2026-28431cvecve-2026-28431cwe-285
Published: Mon Mar 09 2026 (03/09/2026, 21:17:32 UTC)
Source: CVE Database V5
Vendor/Project: misskey-dev
Product: misskey

Description

CVE-2026-28431 is a critical improper authorization vulnerability in Misskey, an open-source federated social media platform. It affects all Misskey servers running versions from 8. 45. 0 up to but not including 2026. 3. 1. The flaw allows attackers to bypass permission checks and access data they should not be able to see, regardless of federation status. Exploitation requires no authentication or user interaction and can lead to significant data breaches. The vulnerability has a CVSS 4. 0 score of 9.

AI-Powered Analysis

AILast updated: 03/09/2026, 21:48:51 UTC

Technical Analysis

CVE-2026-28431 is an improper authorization vulnerability classified under CWE-285 affecting the Misskey platform, versions 8.45.0 through prior to 2026.3.1. Misskey is a federated social media platform that allows decentralized hosting of social networks. The vulnerability arises from insufficient permission checks and inadequate input validation in the platform’s access control mechanisms. This flaw enables unauthenticated attackers to access sensitive data that should be restricted, bypassing normal authorization controls. The vulnerability is independent of whether federation features are enabled, meaning all affected servers are vulnerable. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H) without affecting integrity or availability. The vulnerability was published on March 9, 2026, and fixed in version 2026.3.1. Although no exploits have been reported in the wild yet, the critical severity and ease of exploitation make it a significant threat. The root cause is improper authorization checks allowing unauthorized data access, which could lead to data breaches and privacy violations on affected Misskey instances.

Potential Impact

The impact of CVE-2026-28431 is primarily on confidentiality, as attackers can access sensitive data without authorization. This can lead to significant data breaches exposing user information, private communications, or other sensitive content hosted on Misskey servers. Since Misskey is a federated platform, compromised nodes could also affect trust and privacy across the federation. The vulnerability requires no authentication or user interaction, making exploitation straightforward and scalable. Organizations running vulnerable versions risk reputational damage, regulatory penalties related to data protection laws, and loss of user trust. The availability and integrity of the platform are not directly impacted, but the breach of confidentiality alone is critical for social media platforms handling personal data. The widespread use of Misskey in privacy-conscious communities and decentralized social networks increases the potential scope of impact globally.

Mitigation Recommendations

1. Immediately upgrade all Misskey instances to version 2026.3.1 or later, where the vulnerability is patched. 2. Review and audit access control and permission configurations on Misskey servers to ensure no residual misconfigurations exist. 3. Monitor logs for unusual access patterns or unauthorized data retrieval attempts that could indicate exploitation attempts. 4. Restrict network access to Misskey administrative interfaces and APIs to trusted IPs where possible. 5. Implement additional application-layer security controls such as Web Application Firewalls (WAFs) to detect and block suspicious requests targeting authorization flaws. 6. Educate administrators about the importance of timely patching and secure configuration management in federated social platforms. 7. Consider isolating or segmenting Misskey servers within the network to limit potential lateral movement if compromised. 8. Engage in regular security assessments and penetration testing focused on authorization and access control mechanisms.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-27T15:54:05.137Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69af3cdaea502d3aa8c6d389

Added to database: 3/9/2026, 9:34:18 PM

Last enriched: 3/9/2026, 9:48:51 PM

Last updated: 3/10/2026, 5:31:20 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses