Home

Description

A security vulnerability has been detected in actiontech sqle up to 4.2511.0. The impacted element is an unknown function of the file sqle/utils/jwt.go of the component JWT Secret Handler. The manipulation of the argument JWTSecretKey leads to use of hard-coded cryptographic key . The attack is possible to be carried out remotely. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report and is planning to fix this flaw in an upcoming release.

PUBLISHED Reserved 2025-12-26 | Published 2025-12-27 | Updated 2025-12-27 | Assigner VulDB




MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 3.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
LOW: 3.7CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
2.6AV:N/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR

Problem types

Use of Hard-coded Cryptographic Key

Key Management Error

Product status

4.2511
affected

Timeline

2025-12-26:VulDB entry created
2025-12-27:Advisory disclosed
2025-12-27:VulDB entry last update

Credits

28Hus (VulDB User) reporter

References

vuldb.com/?id.338478 (VDB-338478 | actiontech sqle JWT Secret jwt.go hard-coded key) vdb-entry technical-description

vuldb.com/?ctiid.338478 (VDB-338478 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.710380 (Submit #710380 | https://github.com/actiontech https://github.com/actiontech/sqle ≤4.2511.0 Authentication Bypass by Primary Weakness) third-party-advisory

github.com/actiontech/sqle/issues/3186 exploit issue-tracking

github.com/actiontech/sqle/milestone/53 related

cve.org (CVE-2025-15107)

nvd.nist.gov (CVE-2025-15107)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.