Vulnerability Description
Coral Server is open collaboration infrastructure that enables communication, coordination, trust and payments for The Internet of Agents. Prior to 1.1.0, Coral Server did not enforce strong authentication between agents and the server within an active session. This could allow an attacker who obtained or predicted a session identifier to impersonate an agent or join an existing session. This vulnerability is fixed in 1.1.0.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Coralos | Coral Server | < 1.1.0 |
Related Weaknesses (CWE)
References
- https://github.com/Coral-Protocol/coral-server/releases/tag/v1.1.0Release Notes
- https://github.com/Coral-Protocol/coral-server/security/advisories/GHSA-ccx7-7wvVendor Advisory
FAQ
What is CVE-2026-30969?
CVE-2026-30969 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Coral Server is open collaboration infrastructure that enables communication, coordination, trust and payments for The Internet of Agents. Prior to 1.1.0, Coral Server did not enforce strong authentic...
How severe is CVE-2026-30969?
CVE-2026-30969 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-30969?
Check the references section above for vendor advisories and patch information. Affected products include: Coralos Coral Server.