CVE-2026-33746

Convoy · Convoy Panel

A critical JWT signature verification failure in Convoy allows unauthenticated attackers to forge tokens and bypass SSO authentication to log in as any user.

Executive summary

Convoy Panel versions 3.9.0-beta through 4.5.0 fail to verify JWT signatures, allowing attackers to impersonate any user and gain full administrative access.

Vulnerability

The JWTService::decode() method fails to include the SignedWith constraint during validation. While it checks time-based claims, it does not verify the cryptographic signature. An unauthenticated attacker can forge a JWT with an arbitrary user_uuid to bypass the SSO flow and authenticate as any user.

Business impact

This flaw allows for a complete bypass of authentication. An attacker can gain administrative control over the KVM management panel, allowing them to manage, delete, or access any virtual machine on the system. With a CVSS score of 9.8, this represents a catastrophic risk to hosting businesses and their clients' data.

Remediation

Immediate Action: Upgrade Convoy to version 4.5.1 immediately to enable proper JWT signature verification.

Proactive Monitoring: Review authentication logs for unusual logins or logins from unexpected IP addresses, specifically looking for administrative access patterns.

Compensating Controls: Implement IP whitelisting for the management panel and consider adding a secondary layer of authentication (e.g., hardware-based MFA) that does not rely solely on JWTs.

Exploitation status

Public Exploit Available: No

Analyst recommendation

This is an emergency-level vulnerability for any organization using Convoy. The ability for an unauthenticated attacker to forge an identity and gain access to a server management panel is a "game-over" scenario. The patch to version 4.5.1 must be applied immediately.