Vulnerability Description
OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, some endpoints returned raw exception strings to clients. Additionally, login token material was exposed in UI/rendered responses and token rotation output. This issue has been patched in version 1.6.3-alpha.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opensift | Opensift | < 1.6.3 |
Related Weaknesses (CWE)
References
- https://github.com/OpenSift/OpenSift/commit/1126e0a503876056a68a434e19f64158a5a4Patch
- https://github.com/OpenSift/OpenSift/commit/de99b9cPatch
- https://github.com/OpenSift/OpenSift/pull/67Issue TrackingPatch
- https://github.com/OpenSift/OpenSift/releases/tag/v1.6.3-alphaRelease Notes
- https://github.com/OpenSift/OpenSift/security/advisories/GHSA-667g-rvcj-w976Vendor AdvisoryPatch
FAQ
What is CVE-2026-28675?
CVE-2026-28675 is a vulnerability with a CVSS score of 5.3 (MEDIUM). OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, some endpoints returned raw exception strings to clients. Addition...
How severe is CVE-2026-28675?
CVE-2026-28675 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-28675?
Check the references section above for vendor advisories and patch information. Affected products include: Opensift Opensift.