Skip to content
CVSS 7.3 · HIGH

CVE-2026-7042

A flaw has been found in 666ghj MiroFish up to 0.1.2. This affects the function create_app of the file backend/app/__init__.py of the component REST API Endpoint. Executing a manipulation can lead to missing authentication. It is possible to launch the attack remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

View on NVD

Analysis

MiroFish is an obscure open-source project with very low deployment and visibility. While a remote authentication bypass in a REST API is a high-severity issue, the tool's niche status means it does not pose a systemic risk to the broader developer community.

Severity

Score: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Weakness (CWE): CWE-287CWE-306

EPSS

Probability of exploitation (next 30 days): 0.0008 (0.1%)
Percentile: 23.0%
EPSS: 2026-05-06

Technical description

A flaw has been found in 666ghj MiroFish up to 0.1.2. This affects the function create_app of the file backend/app/__init__.py of the component REST API Endpoint. Executing a manipulation can lead to missing authentication. It is possible to launch the attack remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Published: 4/26/2026, 10:17:31 PM
Last modified: 4/29/2026, 1:00:01 AM

References

HomeEventsBlogResourcesTeam