Skip to content
CVSS 7.3 · HIGH

CVE-2026-7042

A flaw has been found in 666ghj MiroFish up to 0.1.2. This affects the function create_app of the file backend/app/__init__.py of the component REST API Endpoint. Executing a manipulation can lead to missing authentication. It is possible to launch the attack remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Ver en NVD

Análisis

MiroFish is an obscure open-source project with very low deployment and visibility. While a remote authentication bypass in a REST API is a high-severity issue, the tool's niche status means it does not pose a systemic risk to the broader developer community.

Severidad

Puntaje: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Tipo de falla (CWE): CWE-287CWE-306

EPSS

Probabilidad de explotación (próx. 30 días): 0.0008 (0.1%)
Percentil: 23.0%
EPSS: 2026-05-06

Descripción técnica

A flaw has been found in 666ghj MiroFish up to 0.1.2. This affects the function create_app of the file backend/app/__init__.py of the component REST API Endpoint. Executing a manipulation can lead to missing authentication. It is possible to launch the attack remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Publicada: 26/4/2026, 22:17:31
Última modificación: 29/4/2026, 1:00:01

Referencias

InicioEventosBlogRecursosEquipo