Vulnerability Description
A weakness has been identified in MineAdmin 1.x/2.x. This impacts the function refresh of the file /system/refresh of the component JWT Token Handler. This manipulation causes insufficient verification of data authenticity. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mineadmin | Mineadmin | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/SourByte05/MineAdmin-Vulnerability/issues/4ExploitIssue TrackingMitigation
- https://vuldb.com/?ctiid.341780Permissions RequiredVDB Entry
- https://vuldb.com/?id.341780Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.734272Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-1195?
CVE-2026-1195 is a vulnerability with a CVSS score of 5.0 (MEDIUM). A weakness has been identified in MineAdmin 1.x/2.x. This impacts the function refresh of the file /system/refresh of the component JWT Token Handler. This manipulation causes insufficient verificatio...
How severe is CVE-2026-1195?
CVE-2026-1195 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-1195?
Check the references section above for vendor advisories and patch information. Affected products include: Mineadmin Mineadmin.