GHSA-q6mh-rqwh-g786

Suggest an improvement
Source
https://github.com/advisories/GHSA-q6mh-rqwh-g786
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-q6mh-rqwh-g786/GHSA-q6mh-rqwh-g786.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-q6mh-rqwh-g786
Aliases
  • CVE-2026-44523
Published
2026-05-07T21:08:10Z
Modified
2026-05-07T21:18:52.449758Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N CVSS Calculator
Summary
Note Mark has a JWT Secret Weakness that allows Full Account Takeover via Token Forgery
Details

Summary

No minimum length or entropy is enforced on the JWT_SECRET configuration value. The application accepts any base64-decodable secret regardless of size, including secrets as short as 1 byte.

HS256 secrets below 32 bytes are brute-forceable offline, allowing attackers to recover the signing key and forge valid JWTs for arbitrary users.


Impact

An attacker who captures a single valid JWT (e.g, from cookies, logs, or network traffic) can:

> Crack the signing secret offline using brute-force or wordlist attacks > Forge valid JWTs for any user ID (including administrators) > Authenticate without knowing any credentials

This results in full account takeover across the entire application with no server-side detection or rate limiting possible.


Details

In backend/config/utils.go, the Base64Decoded.UnmarshalText function decodes the JWT secret but does not validate its length or entropy.

In backend/core/auth.go, JWT tokens are signed using HS256 without enforcing minimum key size requirements.

According to RFC 7518 Section 3.2, HS256 keys must be at least 256 bits (32 bytes). Libraries such as PyJWT explicitly warn against shorter keys, but note-mark performs no such validation.


PoC

1- Deploy note-mark with a weak secret:

JWT_SECRET = base64("testsecret123456789012345")
   

2- Register an account and capture the Auth-Session-Token cookie

3- Crack the secret offline (example using Python):

import jwt, base64
jwt.decode(TOKEN, base64.b64decode(SECRET), algorithms=["HS256"])
   

4- Forge a new token for any user UUID with extended expiry

5- Send the forged token in requests → server returns 200 Ok and authenticates as that user


Reproduction Steps

1- Deploy the application with a JWT secret shorter than 32 bytes (after base64 decoding) 2- Authenticate and capture a valid JWT 3- Perform offline brute-force or dictionary attack against the token signature 4- Recover the secret 5- Generate a forged JWT for another user 6- Use the forged token to access protected endpoints


Fix Recommendation

  • Enforce a minimum of 32 bytes (256 bits) for JWT secrets after base64 decoding
  • Reject weak secrets during configuration parsing (e.g., in Base64Decoded.UnmarshalText or config validation)
  • Optionally log warnings or fail startup if the secret is insecure

Resources

  • RFC 7518 Section 3.2 (JSON Web Algorithms - HMAC key size requirements)
  • CWE-326: Inadequate Encryption Strength
  • CWE-345: Insufficient Verification of Data Authenticity

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-05-07T21:08:10Z",
    "cwe_ids": [
        "CWE-326",
        "CWE-345"
    ],
    "severity": "CRITICAL",
    "nvd_published_at": null
}
References

Affected packages

Go / github.com/enchant97/note-mark/backend

Package

Name
github.com/enchant97/note-mark/backend
View open source insights on deps.dev
Purl
pkg:golang/github.com/enchant97/note-mark/backend

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.0-20260501152247-18b587758667

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-q6mh-rqwh-g786/GHSA-q6mh-rqwh-g786.json"