CVE-2026-32745: CWE-614 in JetBrains Datalore
In JetBrains Datalore before 2026.1 session hijacking was possible due to missing secure attribute for cookie settings
AI Analysis
Technical Summary
CVE-2026-32745 is a vulnerability identified in JetBrains Datalore prior to version 2026.1, classified under CWE-614 (Sensitive Cookie Without Secure Attribute). The core issue arises from session cookies lacking the 'secure' attribute, which instructs browsers to only send cookies over encrypted HTTPS connections. Without this attribute, cookies may be transmitted over unencrypted HTTP connections, exposing them to interception by attackers on the same or adjacent networks. This exposure can lead to session hijacking, where an attacker can impersonate a legitimate user by capturing their session cookie. The CVSS 3.1 base score is 6.3, reflecting a medium severity level. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or a logically adjacent network segment. No privileges are required (PR:N), but user interaction is necessary (UI:R), such as clicking a malicious link or visiting a compromised site. The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), low on integrity (I:L), and none on availability (A:N). The vulnerability does not currently have known exploits in the wild, but the risk remains significant due to the potential for session hijacking. JetBrains has reserved the CVE and published the vulnerability details, but no patch links are provided yet, indicating a need for users to monitor for updates.
Potential Impact
The primary impact of this vulnerability is the compromise of user session confidentiality. Attackers who can intercept session cookies may gain unauthorized access to user accounts within JetBrains Datalore, potentially exposing sensitive data, intellectual property, or proprietary code notebooks. While the integrity and availability of the system are less affected, the breach of confidentiality can lead to further attacks, including privilege escalation or lateral movement within an organization’s environment. Organizations relying on Datalore for collaborative data science and development may face risks of data leakage or unauthorized access, especially when users connect over insecure or public networks. The requirement for adjacent network access and user interaction somewhat limits the attack surface but does not eliminate risk in environments with shared Wi-Fi or compromised internal networks. The absence of known exploits in the wild reduces immediate urgency but does not preclude future exploitation. Overall, the vulnerability poses a moderate risk to organizations worldwide, particularly those with high-value data and collaborative workflows.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately ensure that all JetBrains Datalore instances are updated to version 2026.1 or later once available, as this version addresses the missing 'secure' attribute on cookies. Until patches are released, administrators should enforce HTTPS strictly across all Datalore web traffic to prevent cookie transmission over unencrypted channels. Implementing HTTP Strict Transport Security (HSTS) headers can help enforce HTTPS usage. Additionally, network segmentation and the use of VPNs can reduce exposure to adjacent network attackers. Educate users to avoid accessing Datalore over untrusted or public Wi-Fi networks without secure VPN connections. Monitoring network traffic for suspicious activity and session anomalies can help detect attempted hijacking. Finally, JetBrains should be engaged to provide timely patches and guidance, and organizations should review their cookie security policies to ensure compliance with best practices, including setting 'HttpOnly' and 'SameSite' attributes where appropriate.
Affected Countries
United States, Germany, Russia, China, Japan, United Kingdom, France, India, Canada, South Korea
CVE-2026-32745: CWE-614 in JetBrains Datalore
Description
In JetBrains Datalore before 2026.1 session hijacking was possible due to missing secure attribute for cookie settings
AI-Powered Analysis
Technical Analysis
CVE-2026-32745 is a vulnerability identified in JetBrains Datalore prior to version 2026.1, classified under CWE-614 (Sensitive Cookie Without Secure Attribute). The core issue arises from session cookies lacking the 'secure' attribute, which instructs browsers to only send cookies over encrypted HTTPS connections. Without this attribute, cookies may be transmitted over unencrypted HTTP connections, exposing them to interception by attackers on the same or adjacent networks. This exposure can lead to session hijacking, where an attacker can impersonate a legitimate user by capturing their session cookie. The CVSS 3.1 base score is 6.3, reflecting a medium severity level. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or a logically adjacent network segment. No privileges are required (PR:N), but user interaction is necessary (UI:R), such as clicking a malicious link or visiting a compromised site. The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), low on integrity (I:L), and none on availability (A:N). The vulnerability does not currently have known exploits in the wild, but the risk remains significant due to the potential for session hijacking. JetBrains has reserved the CVE and published the vulnerability details, but no patch links are provided yet, indicating a need for users to monitor for updates.
Potential Impact
The primary impact of this vulnerability is the compromise of user session confidentiality. Attackers who can intercept session cookies may gain unauthorized access to user accounts within JetBrains Datalore, potentially exposing sensitive data, intellectual property, or proprietary code notebooks. While the integrity and availability of the system are less affected, the breach of confidentiality can lead to further attacks, including privilege escalation or lateral movement within an organization’s environment. Organizations relying on Datalore for collaborative data science and development may face risks of data leakage or unauthorized access, especially when users connect over insecure or public networks. The requirement for adjacent network access and user interaction somewhat limits the attack surface but does not eliminate risk in environments with shared Wi-Fi or compromised internal networks. The absence of known exploits in the wild reduces immediate urgency but does not preclude future exploitation. Overall, the vulnerability poses a moderate risk to organizations worldwide, particularly those with high-value data and collaborative workflows.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately ensure that all JetBrains Datalore instances are updated to version 2026.1 or later once available, as this version addresses the missing 'secure' attribute on cookies. Until patches are released, administrators should enforce HTTPS strictly across all Datalore web traffic to prevent cookie transmission over unencrypted channels. Implementing HTTP Strict Transport Security (HSTS) headers can help enforce HTTPS usage. Additionally, network segmentation and the use of VPNs can reduce exposure to adjacent network attackers. Educate users to avoid accessing Datalore over untrusted or public Wi-Fi networks without secure VPN connections. Monitoring network traffic for suspicious activity and session anomalies can help detect attempted hijacking. Finally, JetBrains should be engaged to provide timely patches and guidance, and organizations should review their cookie security policies to ensure compliance with best practices, including setting 'HttpOnly' and 'SameSite' attributes where appropriate.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- JetBrains
- Date Reserved
- 2026-03-13T15:48:07.191Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b45b752f860ef943872ec4
Added to database: 3/13/2026, 6:46:13 PM
Last enriched: 3/13/2026, 6:46:44 PM
Last updated: 3/13/2026, 8:52:19 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.