CVE-2026-29023: CWE-798 Use of Hard-coded Credentials in KeygraphHQ Shannon
CVE-2026-29023 is a medium-severity vulnerability in KeygraphHQ Shannon caused by a hard-coded API key in the router configuration. When the router component is enabled and exposed to the network, attackers can authenticate using this static key without any privileges or user interaction. This allows them to proxy requests through the Shannon instance, leveraging the victim’s upstream provider API credentials, potentially leading to unauthorized API usage and exposure of proxied request and response data. The vulnerability affects version 0 of Shannon and has a CVSS 4. 0 base score of 6. 9. Although no known exploits are currently in the wild, the issue has been addressed in a recent commit (023cc95). Organizations using Shannon with exposed router components should apply patches or disable the router to mitigate risk.
AI Analysis
Technical Summary
CVE-2026-29023 is a vulnerability classified under CWE-798 (Use of Hard-coded Credentials) affecting KeygraphHQ's Shannon product, specifically version 0. The flaw arises from a hard-coded API key embedded in the router configuration, which is used for authenticating requests when the router component is enabled and exposed externally. Because the key is static and publicly known, any network attacker who can reach the router port can authenticate without any privileges or user interaction. This unauthorized access enables attackers to proxy API requests through the Shannon instance, effectively using the victim’s configured upstream provider API credentials. This can lead to unauthorized API calls, potential data leakage of proxied requests and responses, and abuse of the victim’s API quota or privileges. The vulnerability does not require authentication or user interaction, increasing its exploitability. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N) reflects network attack vector, low attack complexity, no privileges or user interaction required, and low to medium impact on confidentiality, integrity, and availability. The vendor has mitigated the general exploitability with a commit identified as 023cc95, although no official patch link is provided. Organizations running affected versions with exposed router components are at risk and should remediate promptly.
Potential Impact
The impact of CVE-2026-29023 is significant for organizations using KeygraphHQ Shannon with the router component enabled and exposed to untrusted networks. Attackers can exploit the hard-coded API key to gain unauthorized access to the router, proxying API requests through the victim’s configured upstream provider credentials. This can lead to unauthorized API usage, potentially incurring financial costs, exhausting API quotas, or triggering rate limits. Additionally, sensitive data contained in proxied requests and responses may be disclosed, compromising confidentiality. The integrity of API interactions can be undermined by maliciously crafted requests, and availability may be affected if attackers flood the API or router with requests. Since exploitation requires only network access to the router port and no authentication or user interaction, the attack surface is broad if the router is exposed. Organizations relying on Shannon in critical infrastructure or handling sensitive data via upstream APIs face heightened risk of operational disruption and data breaches.
Mitigation Recommendations
To mitigate CVE-2026-29023, organizations should first verify if the router component of Shannon is enabled and exposed to untrusted networks. If exposure is unnecessary, disable the router component entirely to eliminate the attack vector. If the router must be used, immediately update Shannon to a version containing the fix introduced in commit 023cc95 or later, which removes or replaces the hard-coded API key. In the absence of an official patch, implement network-level controls such as firewall rules or access control lists to restrict access to the router port to trusted hosts only. Additionally, monitor API usage logs for unusual or unauthorized activity that could indicate exploitation attempts. Rotate any upstream provider API credentials that may have been exposed or abused. Finally, review the application’s configuration management and deployment processes to prevent hard-coded credentials and enforce secure credential storage practices moving forward.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, Netherlands, Sweden
CVE-2026-29023: CWE-798 Use of Hard-coded Credentials in KeygraphHQ Shannon
Description
CVE-2026-29023 is a medium-severity vulnerability in KeygraphHQ Shannon caused by a hard-coded API key in the router configuration. When the router component is enabled and exposed to the network, attackers can authenticate using this static key without any privileges or user interaction. This allows them to proxy requests through the Shannon instance, leveraging the victim’s upstream provider API credentials, potentially leading to unauthorized API usage and exposure of proxied request and response data. The vulnerability affects version 0 of Shannon and has a CVSS 4. 0 base score of 6. 9. Although no known exploits are currently in the wild, the issue has been addressed in a recent commit (023cc95). Organizations using Shannon with exposed router components should apply patches or disable the router to mitigate risk.
AI-Powered Analysis
Technical Analysis
CVE-2026-29023 is a vulnerability classified under CWE-798 (Use of Hard-coded Credentials) affecting KeygraphHQ's Shannon product, specifically version 0. The flaw arises from a hard-coded API key embedded in the router configuration, which is used for authenticating requests when the router component is enabled and exposed externally. Because the key is static and publicly known, any network attacker who can reach the router port can authenticate without any privileges or user interaction. This unauthorized access enables attackers to proxy API requests through the Shannon instance, effectively using the victim’s configured upstream provider API credentials. This can lead to unauthorized API calls, potential data leakage of proxied requests and responses, and abuse of the victim’s API quota or privileges. The vulnerability does not require authentication or user interaction, increasing its exploitability. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N) reflects network attack vector, low attack complexity, no privileges or user interaction required, and low to medium impact on confidentiality, integrity, and availability. The vendor has mitigated the general exploitability with a commit identified as 023cc95, although no official patch link is provided. Organizations running affected versions with exposed router components are at risk and should remediate promptly.
Potential Impact
The impact of CVE-2026-29023 is significant for organizations using KeygraphHQ Shannon with the router component enabled and exposed to untrusted networks. Attackers can exploit the hard-coded API key to gain unauthorized access to the router, proxying API requests through the victim’s configured upstream provider credentials. This can lead to unauthorized API usage, potentially incurring financial costs, exhausting API quotas, or triggering rate limits. Additionally, sensitive data contained in proxied requests and responses may be disclosed, compromising confidentiality. The integrity of API interactions can be undermined by maliciously crafted requests, and availability may be affected if attackers flood the API or router with requests. Since exploitation requires only network access to the router port and no authentication or user interaction, the attack surface is broad if the router is exposed. Organizations relying on Shannon in critical infrastructure or handling sensitive data via upstream APIs face heightened risk of operational disruption and data breaches.
Mitigation Recommendations
To mitigate CVE-2026-29023, organizations should first verify if the router component of Shannon is enabled and exposed to untrusted networks. If exposure is unnecessary, disable the router component entirely to eliminate the attack vector. If the router must be used, immediately update Shannon to a version containing the fix introduced in commit 023cc95 or later, which removes or replaces the hard-coded API key. In the absence of an official patch, implement network-level controls such as firewall rules or access control lists to restrict access to the router port to trusted hosts only. Additionally, monitor API usage logs for unusual or unauthorized activity that could indicate exploitation attempts. Rotate any upstream provider API credentials that may have been exposed or abused. Finally, review the application’s configuration management and deployment processes to prevent hard-coded credentials and enforce secure credential storage practices moving forward.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-03-03T17:24:13.913Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69af0b9eea502d3aa8af25bb
Added to database: 3/9/2026, 6:04:14 PM
Last enriched: 3/9/2026, 6:18:33 PM
Last updated: 3/9/2026, 8:54:04 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.