Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-41571— Note Mark: OIDC-registered users authenticated by submitting password "null"

CVSS 9.4 · Critical EPSS 0.05% · P17
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-41571

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Note Mark: OIDC-registered users authenticated by submitting password "null"
Source: NVD (National Vulnerability Database)
Vulnerability Description
Note Mark is an open-source note-taking application. In version 0.19.2, IsPasswordMatch in backend/db/models.go falls back to a hard-coded bcrypt("null") placeholder whenever a user has no stored password. OIDC-registered users are created with an empty password, so anyone who submits password: "null" to the internal login endpoint receives a valid session for that user. The bypass is unauthenticated and requires no user interaction. This issue has been patched in version 0.19.3.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
认证机制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Note Mark 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Note Mark是Leo Spratt个人开发者的一个基于网络的Markdown笔记应用程序。 Note Mark 0.19.2版本存在授权问题漏洞,该漏洞源于IsPasswordMatch函数回退到硬编码的bcrypt空密码占位符,可能导致未经身份验证的攻击者提交密码为空时获得有效会话。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
enchant97note-mark = 0.19.2 -

II. Public POCs for CVE-2026-41571

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-41571

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-41571

No comments yet


Leave a comment