Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-35383: CWE-540 Inclusion of Sensitive Information in Source Code in Bentley Systems iTwin Platform

0
Medium
VulnerabilityCVE-2026-35383cvecve-2026-35383cwe-540
Published: Thu Apr 02 2026 (04/02/2026, 19:04:09 UTC)
Source: CVE Database V5
Vendor/Project: Bentley Systems
Product: iTwin Platform

Description

CVE-2026-35383 is a medium severity vulnerability in Bentley Systems iTwin Platform where a Cesium ion access token was inadvertently exposed in the source code of some web pages. This token allowed unauthenticated attackers to enumerate or delete certain assets within the platform. The vulnerability stems from CWE-540, the inclusion of sensitive information in source code. As of March 27, 2026, the token has been removed, mitigating the risk. No known exploits are currently in the wild. The CVSS 3. 1 base score is 6. 5, reflecting network attack vector, no privileges or user interaction required, limited confidentiality impact, and low availability impact. Organizations using the iTwin Platform should verify that their deployments are updated and audit for any unauthorized asset changes. Countries with significant infrastructure and engineering sectors using Bentley Systems products are most likely affected.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 19:55:22 UTC

Technical Analysis

CVE-2026-35383 identifies a vulnerability in the Bentley Systems iTwin Platform where a Cesium ion access token was embedded in the source code of certain web pages. Cesium ion tokens are used to authenticate and authorize access to geospatial assets and services. The exposure of this token in publicly accessible web pages allowed unauthenticated attackers to leverage it to enumerate (list) or delete assets managed by the platform. This vulnerability is classified under CWE-540, which concerns the inclusion of sensitive information such as credentials or tokens in source code, leading to unintended information disclosure. The attack vector is network-based with no authentication or user interaction required, making exploitation relatively straightforward for an attacker who discovers the token. The impact primarily affects confidentiality (limited to asset enumeration) and availability (potential deletion of assets), but does not affect integrity or system-wide control. The vendor removed the token from the web pages as of March 27, 2026, effectively mitigating the vulnerability. No patches or updates are explicitly listed, but the removal of the token is the key remediation step. No known exploits have been reported in the wild, suggesting limited active exploitation. The CVSS 3.1 score of 6.5 reflects a medium severity rating, balancing ease of exploitation against limited impact scope.

Potential Impact

The vulnerability allows attackers to enumerate and delete certain assets within the Bentley iTwin Platform, potentially disrupting engineering, construction, and infrastructure projects that rely on accurate geospatial data. Unauthorized deletion of assets can lead to data loss, operational delays, and increased recovery costs. Asset enumeration could expose sensitive project information or intellectual property, leading to confidentiality breaches. Since the token was exposed publicly, any attacker with access to the web pages could exploit this without authentication, increasing the risk of opportunistic attacks. However, the impact is limited to the scope of assets accessible via the token and does not extend to full system compromise or integrity of other platform components. Organizations relying on the iTwin Platform for critical infrastructure digital twins or project management may face operational disruptions and reputational damage if exploited. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat if tokens remain exposed in legacy deployments.

Mitigation Recommendations

Organizations should immediately verify that their iTwin Platform deployments no longer expose Cesium ion access tokens in any web page source code or client-side scripts. Conduct thorough code and configuration reviews to ensure no sensitive tokens or credentials are embedded in publicly accessible resources. Rotate any Cesium ion tokens that may have been exposed to invalidate compromised credentials. Implement strict access controls and monitoring on asset management APIs to detect and prevent unauthorized enumeration or deletion attempts. Employ web application firewalls (WAFs) to detect anomalous requests targeting asset enumeration or deletion endpoints. Educate development and operations teams on secure coding practices to avoid embedding sensitive information in source code or client-side assets. Regularly audit and update third-party components and dependencies to incorporate vendor fixes. Engage with Bentley Systems support to confirm remediation status and receive guidance on secure configuration. Maintain incident response readiness to quickly address any signs of exploitation or data loss.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisa-cg
Date Reserved
2026-04-02T14:02:18.782Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cec5aae6bfc5ba1dfbd832

Added to database: 4/2/2026, 7:38:18 PM

Last enriched: 4/2/2026, 7:55:22 PM

Last updated: 4/2/2026, 11:35:59 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses