CVE-2026-35467
Unknown · Temporary Browser Client
Stored API keys in a temporary browser client are not marked as protected, allowing for credential extraction via JavaScript console errors or other system faults.
Executive summary
Insecure storage of API keys in a browser-based client allows for the unauthorized extraction of encryption credentials, leading to potential data compromise.
Vulnerability
The vulnerability involves the improper protection of stored API keys within a browser client. Because these keys are not marked as protected, they can be exposed through JavaScript console logs or during error handling, allowing an attacker with local or session access to extract sensitive encryption credentials.
Business impact
The extraction of API keys can lead to unauthorized access to cloud services, databases, or other integrated third-party platforms. With a CVSS score of 7.5, the risk is High, as it could lead to large-scale data exfiltration and the compromise of the entire service ecosystem associated with those keys.
Remediation
Immediate Action: Apply vendor security updates that implement proper protection (such as encryption or secure storage flags) for API keys in the browser client.
Proactive Monitoring: Audit application logs for abnormal API usage patterns that might indicate compromised credentials are being used by unauthorized parties.
Compensating Controls: Implement short-lived API tokens and strict IP-based access controls for API endpoints to minimize the impact of a leaked key.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Developers and administrators must ensure that sensitive credentials are never stored in a way that is accessible to client-side scripts or error-reporting mechanisms. Apply the recommended patches immediately to ensure that API keys are properly protected within the browser environment.