


Perceptive Security
SOC/SIEM Consultancy

Keygraph Shannon contains a hard-coded API key in its router configuration that, when the router component is enabled and exposed, allows network attackers to a…
Published:
8 March 2026 at 23:00:00
Alert date:
9 March 2026 at 19:01:52
Source:
nvd.nist.gov
Web Technologies, Network Infrastructure
Keygraph Shannon contains a hard-coded API key in its router configuration that allows network attackers to authenticate using a publicly known static key. When the router component is enabled and exposed, attackers can proxy requests through the Shannon instance using victim's configured upstream provider API credentials. This results in unauthorized API usage and potential disclosure of proxied request and response data. The vulnerability allows attackers to reach the router port and exploit the authentication bypass. The issue has been mitigated with commit 023cc95.
Technical details
Mitigation steps:
Affected products:
Keygraph Shannon
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-29023
https://github.com/KeygraphHQ/shannon/issues/186
https://github.com/KeygraphHQ/shannon/pull/224
https://github.com/KeygraphHQ/shannon/pull/224/changes/023cc953db742602964b7826105278d15c28a420
https://www.vulncheck.com/advisories/keygraph-shannon-hard-coded-router-api-key
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
