Cyber Posture

CVE-2026-38651

High

Published: 28 April 2026

Published
28 April 2026
Modified
28 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0003 8.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-38651 is a high-severity Improper Verification of Cryptographic Signature (CWE-347) vulnerability. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 8.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-3 (Device Identification and Authentication) and SI-7 (Software, Firmware, and Information Integrity).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires identification and authentication of devices/hosts prior to network access, directly preventing impersonation via forged host JWT tokens.

prevent

Mandates integrity verification for software, firmware, and information, including cryptographic signature checks on JWT host tokens to detect forgery.

prevent

Ensures secure management of authenticators like JWTs, including protection against alteration and compromise during verification.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an authentication bypass in a public-facing Netmaker application allowing remote unauthenticated attackers to forge JWT tokens and impersonate hosts for unauthorized access.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Authentication Bypass vulnerability exists in Netmaker versions prior to 1.5.0. The VerifyHostToken function in logic/jwts.go fails to validate the JWT signature when verifying host tokens. An attacker can forge a JWT signed with any arbitrary key and use it to…

more

impersonate any host in the network, gaining access to sensitive information

Deeper analysisAI

CVE-2026-38651 is an authentication bypass vulnerability affecting Netmaker versions prior to 1.5.0. The issue resides in the VerifyHostToken function within logic/jwts.go, which fails to properly validate the JWT signature during host token verification. This flaw, classified under CWE-347 (Improper Verification of Cryptographic Signature), carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N) and was published on 2026-04-28.

An unauthenticated attacker with network access can exploit this vulnerability by forging a JWT token signed with any arbitrary key. By presenting the forged token, the attacker can impersonate any host within the Netmaker network, thereby gaining unauthorized access to sensitive information. The impact includes high confidentiality loss and low integrity disruption, with no availability effects.

Mitigation involves upgrading to Netmaker version 1.5.0 or later, where the fix is implemented as detailed in the patch commit at https://github.com/gravitl/netmaker/commit/5309aa70d464ef565911369714d661a61481a79b. Additional guidance is available in advisories and blog posts from Zyenra at https://www.zyenra.com/advisories/netmaker-jwt-verification-bypass and https://www.zyenra.com/blog/netmaker-jwt-verification-bypass.

Details

CWE(s)

Affected Products

Netmaker
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-27773Shared CWE-347
CVE-2026-5466Shared CWE-347
CVE-2026-34377Shared CWE-347
CVE-2026-20997Shared CWE-347
CVE-2026-24032Shared CWE-347
CVE-2026-0750Shared CWE-347
CVE-2026-5050Shared CWE-347
CVE-2026-28432Shared CWE-347
CVE-2026-23518Shared CWE-347
CVE-2025-27670Shared CWE-347

References