First published: Tue Feb 20 2024(Updated: )
kedi ElectronCord is a bot management tool for Discord. Commit aaaeaf4e6c99893827b2eea4dd02f755e1e24041 exposes an account access token in the `config.json` file. Malicious actors could potentially exploit this vulnerability to gain unauthorized access to sensitive information or perform malicious actions on behalf of the repository owner. As of time of publication, it is unknown whether the owner of the repository has rotated the token or taken other mitigation steps aside from informing users of the situation.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Electroncord | ||
Electroncord | <2024-02-19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26136 has a high severity due to the exposure of sensitive account access tokens.
To fix CVE-2024-26136, remove the exposed account access token from the config.json file and implement proper access controls.
CVE-2024-26136 potentially allows malicious actors to gain unauthorized access to user accounts and sensitive information.
CVE-2024-26136 affects all versions of ElectronCord up to version 2024-02-19.
While there is no reported public exploit for CVE-2024-26136, the vulnerability poses significant risks if the exposed tokens are discovered by attackers.