Cloud Foundry Logo
blog single gear
Security Advisory

CVE-2026-40965 – UAA EC Private Key Disclosure via token_keys JSON Response

Severity

10.0 / Critical

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L

10.0 / Critical

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L

Vendor

CloudFoundry Foundation

Description

Cloud Foundry UAA versions v76.12.0 through v78.12.0 are vulnerable to a private key exposure. The server contains a vulnerability where EC (Elliptic Curve) private keys are inadvertently exposed through the public /token_keys endpoint. This endpoint is designed to provide public key material for JWT token verification but incorrectly exposes private key components for EC keys. The vulnerability affects deployments using EC keys for JWT token signing. The vulnerability does not affect RSA key configurations, only deployments using EC keys for JWT signing.

Versions Affected

*Severity is high unless otherwise noted.

  • uaa_release
    All versions from v76.12.0 to v78.12.0 (inclusive)
  • CF Deployment
    All versions from v30.0.0 to v56.0.0 (inclusive)

Mitigation

Users of affected products are strongly encouraged to follow the mitigations below.

The Cloud Foundry project recommends upgrading the following releases:

  • uaa_release
    Upgrade uaa_release versions to v78.13.0 or greater
  • CF Deployment
    Upgrade cf-deployment version to v56.1.0 or greater
    Includes uaa_release v78.13.0

Credit

Reported by the UAA Cloud Foundry team and by Arthur Chan from Ada Logics in collaboration with Claude and Anthropic Research

History

May 13th 2026: Initial vulnerability report published
May 14th 2026: Re-published to make visible

Cloud Foundry Foundation Security Team Profile Image

Cloud Foundry Foundation Security Team, AUTHOR

SEE ALL ARTICLES