{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15107","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-26T23:07:40.119Z","datePublished":"2025-12-27T12:32:06.081Z","dateUpdated":"2025-12-29T15:57:28.455Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-12-27T12:32:06.081Z"},"title":"actiontech sqle JWT Secret jwt.go hard-coded key","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-321","lang":"en","description":"Use of Hard-coded Cryptographic Key"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-320","lang":"en","description":"Key Management Error"}]}],"affected":[{"vendor":"actiontech","product":"sqle","versions":[{"version":"4.2511","status":"affected"}],"modules":["JWT Secret Handler"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in actiontech sqle up to 4.2511.0. The impacted element is an unknown function of the file sqle/utils/jwt.go of the component JWT Secret Handler. The manipulation of the argument JWTSecretKey leads to use of hard-coded cryptographic key\r . The attack is possible to be carried out remotely. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report and is planning to fix this flaw in an upcoming release."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.7,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.7,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.6,"vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-26T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-27T00:12:48.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"28Hus (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.338478","name":"VDB-338478 | actiontech sqle JWT Secret jwt.go hard-coded key","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.338478","name":"VDB-338478 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.710380","name":"Submit #710380 | https://github.com/actiontech https://github.com/actiontech/sqle ≤4.2511.0 Authentication Bypass by Primary Weakness","tags":["third-party-advisory"]},{"url":"https://github.com/actiontech/sqle/issues/3186","tags":["exploit","issue-tracking"]},{"url":"https://github.com/actiontech/sqle/milestone/53","tags":["related"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-29T15:57:13.724202Z","id":"CVE-2025-15107","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-29T15:57:28.455Z"}}]}}