CVE-2026-28675
Received Received - Intake
Information Disclosure in OpenSift Exposes Tokens and Exceptions

Publication date: 2026-03-06

Last updated on: 2026-03-18

Assigner: GitHub, Inc.

Description
OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, some endpoints returned raw exception strings to clients. Additionally, login token material was exposed in UI/rendered responses and token rotation output. This issue has been patched in version 1.6.3-alpha.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-06
Last Modified
2026-03-18
Generated
2026-05-07
AI Q&A
2026-03-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
opensift opensift to 1.6.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-209 The product generates an error message that includes sensitive information about its environment, users, or associated data.
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-28675 is a security vulnerability in OpenSift, an AI study tool, where prior to version 1.6.3-alpha some API endpoints exposed raw exception messages and login token material directly to clients. This exposure could reveal sensitive internal error details and authentication tokens.

The vulnerability involves two main issues: leaking raw exception strings in responses, and exposing full login tokens in UI-rendered pages and token rotation outputs. These issues could aid attackers in gathering sensitive information to facilitate further attacks.

The problem was addressed by sanitizing error messages to avoid leaking raw exceptions, removing full token exposure from UI and API responses, and hardening URL ingestion and file path handling to prevent other related security risks.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized remote attackers to gain sensitive information such as internal error details and authentication tokens without any privileges or user interaction.

Exposure of raw exception messages can reveal implementation details that help attackers understand the system and craft further attacks.

Exposure of login tokens in UI and API responses can enable attackers to hijack sessions or perform unauthorized actions if they obtain these tokens.

While the vulnerability does not directly affect data integrity or availability, it poses a confidentiality risk that could facilitate subsequent attacks.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'Detection of this vulnerability involves checking if your OpenSift deployment is running a version prior to 1.6.3-alpha, as those versions expose raw exception strings and login token material in API responses and UI renderings.'}, {'type': 'paragraph', 'content': 'You can detect potential exploitation or presence of the vulnerability by monitoring network traffic or API responses for raw exception messages or exposed tokens in endpoints related to login, token rotation, or error responses.'}, {'type': 'paragraph', 'content': 'Suggested commands to detect this include using curl or similar tools to query relevant endpoints and inspect responses for sensitive information exposure:'}, {'type': 'list_item', 'content': "curl -v http://your-opensift-instance/api/rotate-token -H 'Authorization: Bearer <token>'"}, {'type': 'list_item', 'content': 'curl -v http://your-opensift-instance/login -i'}, {'type': 'list_item', 'content': 'curl -v http://your-opensift-instance/settings -i'}, {'type': 'paragraph', 'content': 'Look for raw exception strings or full login tokens in the responses, which indicate the vulnerability is present.'}, {'type': 'paragraph', 'content': 'Additionally, reviewing logs for error messages that include raw exception details or token material can help detect the vulnerability.'}] [5]


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to upgrade OpenSift to version 1.6.3-alpha or later, where the vulnerability has been patched.

If immediate upgrade is not possible, apply the following steps to reduce risk:

  • Restrict access to authentication and settings endpoints (such as login, rotate-token, and settings pages) to trusted administrators only.
  • Prefer password authentication over token-based authentication where feasible.
  • Rotate all tokens immediately if there is any suspicion of token exposure.
  • Monitor and sanitize logs and API responses to avoid leaking raw exception details.

These steps help prevent unauthorized access and reduce the risk of sensitive information leakage until the patched version is deployed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart