Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
9.1

DSA Study Hub: Unprotected Login Tokens Exposed in Cookies

CVE-2026-28678
Summary

The DSA Study Hub login system stored sensitive information in a way that could be accessed by unauthorized users. This could have allowed hackers to access user accounts and sensitive data without needing a password. The vulnerability has been fixed, but users should still be cautious and use strong passwords and two-factor authentication to protect their accounts.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
toxicbishop dsa_study_hub <= 2026-02-21 –
Original title
DSA Study Hub is an interactive educational web application. Prior to commit d527fba, the user authentication system in server/routes/auth.js was found to be vulnerable to Insufficiently Protected ...
Original description
DSA Study Hub is an interactive educational web application. Prior to commit d527fba, the user authentication system in server/routes/auth.js was found to be vulnerable to Insufficiently Protected Credentials. Authentication tokens (JWTs) were stored in HTTP cookies without cryptographic protection of the payload. This issue has been patched via commit d527fba.
nvd CVSS3.1 8.1
Vulnerability type
CWE-311 Missing Encryption of Sensitive Data
CWE-522 Insufficiently Protected Credentials
Published: 7 Mar 2026 · Updated: 13 Mar 2026 · First seen: 7 Mar 2026