Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <b0cc76fe-de8d-4801-afa2-0ed3c127fee3@apache.org>
Date: Thu, 09 Apr 2026 14:21:08 +0000
From: Maxim Solodovnik <solomax@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2026-33266: Apache OpenMeetings: Hardcoded Remember-Me Cookie
 Encryption Key and Salt 

Severity: important 

Affected versions:

- Apache OpenMeetings 6.1.0 before 9.0.0

Description:

Use of Hard-coded Cryptographic Key vulnerability in Apache OpenMeetings.

The remember-me cookie encryption key is set to default value in openmeetings.properties and not being auto-rotated. In case OM admin hasn't changed the default encryption key, an attacker who has stolen a cookie from a logged-in user can get full user credentials.


This issue affects Apache OpenMeetings: from 6.1.0 before 9.0.0.

Users are recommended to upgrade to version 9.0.0, which fixes the issue.

This issue is being tracked as OPENMEETINGS-2813 

Credit:

4ra2n (A code security AI agent) (finder)

References:

https://openmeetings.apache.org/
https://www.cve.org/CVERecord?id=CVE-2026-33266
https://issues.apache.org/jira/browse/OPENMEETINGS-2813

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.