4ga Boards is a boards system for realtime project management. Prior to 3.3.5, 4ga Boards is vulnerable to user enumeration via a timing side-channel in the login endpoint (POST /api/access-tokens). When an invalid username/email is provided, the server responds immediately (~17ms average). When a valid username/email is provided with an incorrect password, the server first performs a bcrypt.compareSync() operation (~74ms average) before responding. This ~4.4× timing difference is trivially detectable even over a network — a single request suffices. This vulnerability is fixed in 3.3.5.
History

Fri, 24 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Description 4ga Boards is a boards system for realtime project management. Prior to 3.3.5, 4ga Boards is vulnerable to user enumeration via a timing side-channel in the login endpoint (POST /api/access-tokens). When an invalid username/email is provided, the server responds immediately (~17ms average). When a valid username/email is provided with an incorrect password, the server first performs a bcrypt.compareSync() operation (~74ms average) before responding. This ~4.4× timing difference is trivially detectable even over a network — a single request suffices. This vulnerability is fixed in 3.3.5.
Title 4ga Boards: User Enumeration via Timing Side-Channel in Authentication Endpoint
Weaknesses CWE-208
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-24T19:59:10.069Z

Reserved: 2026-04-20T15:32:33.813Z

Link: CVE-2026-41418

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-24T19:17:13.457

Modified: 2026-04-24T19:17:13.457

Link: CVE-2026-41418

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.