Home

Description

A vulnerability was determined in opsre go-ldap-admin up to 20251011. This issue affects some unknown processing of the file docs/docker-compose/docker-compose.yaml of the component JWT Handler. Executing manipulation of the argument secret key can lead to use of hard-coded cryptographic key . The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized.

PUBLISHED Reserved 2025-12-03 | Published 2025-12-03 | Updated 2025-12-03 | Assigner VulDB




MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.6CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 5.6CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
5.1AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Use of Hard-coded Cryptographic Key

Key Management Error

Product status

20251011
affected

Timeline

2025-12-03:Advisory disclosed
2025-12-03:VulDB entry created
2025-12-03:VulDB entry last update

Credits

28Hus (VulDB User) reporter

References

vuldb.com/?id.334163 (VDB-334163 | opsre go-ldap-admin JWT docker-compose.yaml hard-coded key) vdb-entry technical-description

vuldb.com/?ctiid.334163 (VDB-334163 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.692213 (Submit #692213 | https://github.com/opsre https://github.com/opsre/go-ldap-admin Latest Authorization Bypass) third-party-advisory

gist.github.com/H2u8s/a51ac1fe38d62746d1425b70ff49420c exploit

cve.org (CVE-2025-13948)

nvd.nist.gov (CVE-2025-13948)