CVE-2026-41418 | RARgames 4gaBoards up to 3.3.4 Login Endpoint /api/access-tokens bcrypt.compareSync timing discrepancy (GHSA-8mj9-p99h-jhxp)
VulDBArchived Apr 24, 2026✓ Full text saved
A vulnerability classified as problematic has been found in RARgames 4gaBoards up to 3.3.4 . This impacts the function bcrypt.compareSync of the file /api/access-tokens of the component Login Endpoint . This manipulation causes observable timing discrepancy. This vulnerability appears as CVE-2026-41418 . The attack may be initiated remotely. There is no available exploit. It is recommended to upgrade the affected component.
Full text archived locally
✦ AI Summary· Claude Sonnet
VDB-359534 · CVE-2026-41418 · GHSA-8MJ9-P99H-JHXP
RARGAMES 4GABOARDS UP TO 3.3.4 LOGIN ENDPOINT /API/ACCESS-TOKENS BCRYPT.COMPARESYNC TIMING DISCREPANCY
HISTORYDIFFRELATEJSONXMLCTI
CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score
5.2 $0-$5k 1.12+
Summaryinfo
A vulnerability classified as problematic was found in RARgames 4gaBoards up to 3.3.4. Affected is the function bcrypt.compareSync of the file /api/access-tokens of the component Login Endpoint. Such manipulation leads to timing discrepancy. This vulnerability is traded as CVE-2026-41418. The attack may be launched remotely. There is no exploit available. Upgrading the affected component is advised.
Detailsinfo
A vulnerability, which was classified as problematic, has been found in RARgames 4gaBoards up to 3.3.4. Affected by this issue is the function bcrypt.compareSync of the file /api/access-tokens of the component Login Endpoint. The manipulation with an unknown input leads to a timing discrepancy vulnerability. Using CWE to declare the problem leads to CWE-208. Two separate operations in a product require different amounts of time to complete, in a way that is observable to an actor and reveals security-relevant information about the state of the product, such as whether a particular operation was successful or not. Impacted is confidentiality. CVE summarizes:
4ga Boards is a boards system for realtime project management. Prior to 3.3.5, 4ga Boards is vulnerable to user enumeration via a timing side-channel in the login endpoint (POST /api/access-tokens). When an invalid username/email is provided, the server responds immediately (~17ms average). When a valid username/email is provided with an incorrect password, the server first performs a bcrypt.compareSync() operation (~74ms average) before responding. This ~4.4× timing difference is trivially detectable even over a network — a single request suffices. This vulnerability is fixed in 3.3.5.
The advisory is available at github.com. This vulnerability is handled as CVE-2026-41418 since 04/20/2026. The exploitation is known to be easy. The attack may be launched remotely. No form of authentication is required for exploitation. Technical details are known, but there is no available exploit. This vulnerability is assigned to T1592 by the MITRE ATT&CK project.
Upgrading to version 3.3.5 eliminates this vulnerability.
Productinfo
Type
Forum Software
Vendor
RARgames
Name
4gaBoards
Version
3.3.0
3.3.1
3.3.2
3.3.3
3.3.4
Website
Product: https://github.com/RARgames/4gaBoards/
CPE 2.3info
🔒
🔒
🔒
CPE 2.2info
🔒
🔒
🔒
CVSSv4info
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv3info
VulDB Meta Base Score: 5.3
VulDB Meta Temp Score: 5.2
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔒
VulDB Reliability: 🔍
CNA Base Score: 5.3
CNA Vector (GitHub_M): 🔒
CVSSv2info
Vector Complexity Authentication Confidentiality Integrity Availability
Unlock Unlock Unlock Unlock Unlock Unlock
Unlock Unlock Unlock Unlock Unlock Unlock
Unlock Unlock Unlock Unlock Unlock Unlock
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploitinginfo
Class: Timing discrepancy
CWE: CWE-208 / CWE-203 / CWE-200
CAPEC: 🔒
ATT&CK: 🔒
Physical: No
Local: No
Remote: Yes
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day Unlock Unlock Unlock Unlock
Today Unlock Unlock Unlock Unlock
Threat Intelligenceinfo
Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍
Countermeasuresinfo
Recommended: Upgrade
Status: 🔍
0-Day Time: 🔒
Upgrade: 4gaBoards 3.3.5
Timelineinfo
04/20/2026 CVE reserved
04/24/2026 +4 days Advisory disclosed
04/24/2026 +0 days VulDB entry created
04/24/2026 +0 days VulDB entry last update
Sourcesinfo
Product: github.com
Advisory: GHSA-8mj9-p99h-jhxp
Status: Confirmed
CVE: CVE-2026-41418 (🔒)
GCVE (CVE): GCVE-0-2026-41418
GCVE (VulDB): GCVE-100-359534
Entryinfo
Created: 04/24/2026 21:24
Changes: 04/24/2026 21:24 (68)
Complete: 🔍
Cache ID: 99:223:101
Discussion
No comments yet. Languages: en.
Please log in to comment.
◂ PreviousOverviewNext ▸