CVE-2026-8321: Inkeep Agents Authentication Bypass Vulnerability
The National Vulnerability Database has disclosed CVE-2026-8321, a high-severity authentication bypass vulnerability affecting Inkeep agents version 0.58.14. This critical flaw resides within the createDevContext function of the agents-api/src/middleware/runAuth.ts file, specifically within the runAuth Middleware component. Attackers can exploit this vulnerability remotely to bypass authentication mechanisms using an alternate channel.
The CVSS score for CVE-2026-8321 is 7.3 (HIGH), with a vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L. This indicates a network-exploitable vulnerability requiring low attack complexity and no user interaction, leading to low impacts on confidentiality, integrity, and availability. The exploit code is now public, significantly increasing the immediate risk for organizations running affected Inkeep agent versions.
Despite early notification via an issue report, the project maintainers have not yet responded. This lack of communication leaves defenders in a precarious position, as a patch is not yet available for a publicly exploited vulnerability. Organizations using Inkeep agents must prioritize identifying their exposure and implementing compensating controls.
What This Means For You
- If your organization uses Inkeep agents, specifically version 0.58.14, you are immediately vulnerable to a remote authentication bypass due to CVE-2026-8321. The exploit is public. You must identify all instances of Inkeep agents in your environment, assess their version, and isolate or disable affected systems if a patch is not available. Implement strict network segmentation and monitor for any unusual authentication attempts or access to systems protected by Inkeep agents.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-8321: Inkeep Agents Authentication Bypass via Alternate Channel
title: CVE-2026-8321: Inkeep Agents Authentication Bypass via Alternate Channel
id: scw-2026-05-11-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-8321 by targeting the createDevContext function within the runAuth Middleware of Inkeep Agents. This rule looks for specific HTTP POST requests to '/runAuth' with 'createDevContext' in the query string, indicating a potential authentication bypass attempt using an alternate channel.
author: SCW Feed Engine (AI-generated)
date: 2026-05-11
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-8321/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/runAuth'
cs-method:
- 'POST'
sc-status:
- '200'
cs-uri-query|contains:
- 'createDevContext'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-8321 | Auth Bypass | inkeep agents version 0.58.14 |
| CVE-2026-8321 | Auth Bypass | runAuth Middleware component |
| CVE-2026-8321 | Auth Bypass | function createDevContext in agents-api/src/middleware/runAuth.ts |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 11, 2026 at 23:25 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.