Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29023: CWE-798 Use of Hard-coded Credentials in KeygraphHQ Shannon

0
Medium
VulnerabilityCVE-2026-29023cvecve-2026-29023cwe-798
Published: Mon Mar 09 2026 (03/09/2026, 17:46:57 UTC)
Source: CVE Database V5
Vendor/Project: KeygraphHQ
Product: Shannon

Description

CVE-2026-29023 is a medium-severity vulnerability in KeygraphHQ Shannon caused by a hard-coded API key in the router configuration. When the router component is enabled and exposed to the network, attackers can authenticate using this static key without any privileges or user interaction. This allows them to proxy requests through the Shannon instance, leveraging the victim’s upstream provider API credentials, potentially leading to unauthorized API usage and exposure of proxied request and response data. The vulnerability affects version 0 of Shannon and has a CVSS 4. 0 base score of 6. 9. Although no known exploits are currently in the wild, the issue has been addressed in a recent commit (023cc95). Organizations using Shannon with exposed router components should apply patches or disable the router to mitigate risk.

AI-Powered Analysis

AILast updated: 03/09/2026, 18:18:33 UTC

Technical Analysis

CVE-2026-29023 is a vulnerability classified under CWE-798 (Use of Hard-coded Credentials) affecting KeygraphHQ's Shannon product, specifically version 0. The flaw arises from a hard-coded API key embedded in the router configuration, which is used for authenticating requests when the router component is enabled and exposed externally. Because the key is static and publicly known, any network attacker who can reach the router port can authenticate without any privileges or user interaction. This unauthorized access enables attackers to proxy API requests through the Shannon instance, effectively using the victim’s configured upstream provider API credentials. This can lead to unauthorized API calls, potential data leakage of proxied requests and responses, and abuse of the victim’s API quota or privileges. The vulnerability does not require authentication or user interaction, increasing its exploitability. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N) reflects network attack vector, low attack complexity, no privileges or user interaction required, and low to medium impact on confidentiality, integrity, and availability. The vendor has mitigated the general exploitability with a commit identified as 023cc95, although no official patch link is provided. Organizations running affected versions with exposed router components are at risk and should remediate promptly.

Potential Impact

The impact of CVE-2026-29023 is significant for organizations using KeygraphHQ Shannon with the router component enabled and exposed to untrusted networks. Attackers can exploit the hard-coded API key to gain unauthorized access to the router, proxying API requests through the victim’s configured upstream provider credentials. This can lead to unauthorized API usage, potentially incurring financial costs, exhausting API quotas, or triggering rate limits. Additionally, sensitive data contained in proxied requests and responses may be disclosed, compromising confidentiality. The integrity of API interactions can be undermined by maliciously crafted requests, and availability may be affected if attackers flood the API or router with requests. Since exploitation requires only network access to the router port and no authentication or user interaction, the attack surface is broad if the router is exposed. Organizations relying on Shannon in critical infrastructure or handling sensitive data via upstream APIs face heightened risk of operational disruption and data breaches.

Mitigation Recommendations

To mitigate CVE-2026-29023, organizations should first verify if the router component of Shannon is enabled and exposed to untrusted networks. If exposure is unnecessary, disable the router component entirely to eliminate the attack vector. If the router must be used, immediately update Shannon to a version containing the fix introduced in commit 023cc95 or later, which removes or replaces the hard-coded API key. In the absence of an official patch, implement network-level controls such as firewall rules or access control lists to restrict access to the router port to trusted hosts only. Additionally, monitor API usage logs for unusual or unauthorized activity that could indicate exploitation attempts. Rotate any upstream provider API credentials that may have been exposed or abused. Finally, review the application’s configuration management and deployment processes to prevent hard-coded credentials and enforce secure credential storage practices moving forward.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-03T17:24:13.913Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69af0b9eea502d3aa8af25bb

Added to database: 3/9/2026, 6:04:14 PM

Last enriched: 3/9/2026, 6:18:33 PM

Last updated: 3/9/2026, 8:54:04 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses