Home

Description

eLabFTW is an open source electronic lab notebook. In elabftw versions through 5.4.1, the login flow did not reliably preserve the multi-factor authentication state across authentication steps. Under certain conditions, an attacker with valid primary credentials could complete authentication with an attacker-controlled TOTP secret and bypass the additional factor. This could result in unauthorized account access. This issue is fixed in version 5.4.2.

PUBLISHED Reserved 2026-02-27 | Published 2026-05-05 | Updated 2026-05-06 | Assigner GitHub_M




MEDIUM: 5.9CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-302: Authentication Bypass by Assumed-Immutable Data

Product status

= 5.4.1
affected

References

github.com/...labftw/security/advisories/GHSA-x5wv-c9q4-fj65

github.com/...ommit/8b7a575aef128870861187eaa2b2f0f08654ecf9

cve.org (CVE-2026-28510)

nvd.nist.gov (CVE-2026-28510)

Download JSON