CVE-2026-29023
Received Received - Intake
Hardcoded API Key in Keygraph Shannon Router Enables Unauthorized Access

Publication date: 2026-03-09

Last updated on: 2026-03-09

Assigner: VulnCheck

Description
Keygraph Shannon contains a hard-coded API key in its router configuration that, when the router component is enabled and exposed, allows network attackers to authenticate using the publicly known static key. An attacker able to reach the router port can proxy requests through the Shannon instance using the victim’s configured upstream provider API credentials, resulting in unauthorized API usage and potential disclosure of proxied request and response data. This vulnerability's general exploitability has been mitigated with the introduction of commit 023cc95.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-09
Last Modified
2026-03-09
Generated
2026-05-07
AI Q&A
2026-03-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
keygraph shannon to 023cc95 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-798 The product contains hard-coded credentials, such as a password or cryptographic key.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-29023 is a medium-severity vulnerability in Keygraph Shannon caused by a hard-coded API key embedded in its router configuration. When the router component is enabled and exposed to the network, attackers who can reach the router port can authenticate using this publicly known static key.

This allows attackers to proxy requests through the Shannon instance using the victim’s configured upstream provider API credentials, leading to unauthorized API usage and potential disclosure of proxied request and response data.

The vulnerability affects versions of Shannon prior to a specific commit (023cc95) that mitigates general exploitability by removing the hardcoded key and restricting network exposure.


How can this vulnerability impact me? :

If you are running a vulnerable version of Keygraph Shannon with the router component enabled and exposed, an attacker on the network can use the hardcoded API key to authenticate to the router.

This enables the attacker to proxy API requests through your Shannon instance, effectively using your paid API credentials without authorization.

Such unauthorized usage can lead to unexpected charges, depletion of API quotas, and potential exposure of sensitive data contained in proxied requests and responses.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking if the router component of Keygraph Shannon is enabled and exposed on the network, specifically if port 3456 is bound to all network interfaces (0.0.0.0). The presence of a hardcoded API key "shannon-router-key" in the router configuration file (configs/router-config.json) is a key indicator.'}, {'type': 'paragraph', 'content': 'To detect this on your system or network, you can run commands to check for open ports and inspect configuration files:'}, {'type': 'list_item', 'content': 'Use netstat or ss to check if port 3456 is listening on 0.0.0.0 (all interfaces):'}, {'type': 'list_item', 'content': ' - netstat -tuln | grep 3456'}, {'type': 'list_item', 'content': ' - ss -tuln | grep 3456'}, {'type': 'list_item', 'content': 'Inspect the router configuration file for the hardcoded API key:'}, {'type': 'list_item', 'content': ' - grep -r "shannon-router-key" configs/router-config.json'}, {'type': 'list_item', 'content': 'Check environment variables exported by shell scripts for the presence of ANTHROPIC_AUTH_TOKEN set to the hardcoded key.'}, {'type': 'paragraph', 'content': 'Additionally, scanning for exposed web interfaces on ports 7233 and 8233 bound to 0.0.0.0 can help identify other related exposures.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting network exposure and removing hardcoded credentials:

  • Bind all exposed ports, especially the router port 3456, to localhost (127.0.0.1) instead of 0.0.0.0 to prevent external network access.
  • Replace the hardcoded API key in the router configuration with a randomly generated key at startup to avoid using a publicly known static key.
  • Avoid exporting sensitive environment variables such as ANTHROPIC_AUTH_TOKEN globally; restrict environment variables passed to subprocesses to an allowlist.
  • Remove or secure exposed web interfaces (ports 7233 and 8233) by adding authentication or binding them to localhost.
  • Update to the version including commit 023cc95 or later, which mitigates the general exploitability of this vulnerability.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart