CVE-2026-30223

8.8 HIGH

📋 TL;DR

This vulnerability in OliveTin allows authentication bypass when JWT authentication is configured. Attackers can use validly signed JWT tokens intended for different audiences to gain unauthorized access to the web interface. This affects all OliveTin deployments using JWT authentication prior to version 3000.11.1.

💻 Affected Systems

Products:
  • OliveTin
Versions: All versions prior to 3000.11.1
Operating Systems: All platforms running OliveTin
Default Config Vulnerable: ✅ No
Notes: Only affects deployments using JWT authentication with either authJwtPubKeyPath or authJwtHmacSecret configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the OliveTin instance allowing execution of arbitrary shell commands configured in the interface, potentially leading to full system takeover.

🟠

Likely Case

Unauthorized users gain access to execute predefined shell commands through the web interface, potentially leading to data exposure, system modification, or lateral movement.

🟢

If Mitigated

With proper network segmentation and limited shell command permissions, impact is reduced to the specific commands available in the OliveTin configuration.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a valid JWT token signed with the correct key/secret but with incorrect audience claim. Attackers need access to valid tokens from other services using the same signing key.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3000.11.1

Vendor Advisory: https://github.com/OliveTin/OliveTin/security/advisories/GHSA-g962-2j28-3cg9

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Stop OliveTin service. 3. Update to version 3000.11.1 or later. 4. Restart OliveTin service. 5. Verify functionality.

🔧 Temporary Workarounds

Disable JWT Authentication

all

Temporarily disable JWT authentication and use alternative authentication methods

Edit OliveTin configuration to remove authJwtPubKeyPath or authJwtHmacSecret settings

Network Isolation

all

Restrict network access to OliveTin web interface

Configure firewall rules to limit access to trusted IP addresses only

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the OliveTin web interface
  • Review and minimize the shell commands available in OliveTin configuration to reduce attack surface

🔍 How to Verify

Check if Vulnerable:

Check OliveTin version and JWT configuration. If version < 3000.11.1 and using JWT authentication, the system is vulnerable.

Check Version:

olivetin --version

Verify Fix Applied:

After updating to 3000.11.1 or later, test authentication with JWT tokens containing incorrect audience claims - they should be rejected.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts with JWT tokens
  • Successful authentications from unexpected sources
  • Audit logs showing JWT token validation failures

Network Indicators:

  • Unusual authentication patterns to OliveTin web interface
  • Requests with JWT tokens from unexpected sources

SIEM Query:

source="olivetin" AND (event_type="authentication" AND result="success") | stats count by src_ip, user

🔗 References

📤 Share & Export