Description
A vulnerability was detected in PandaXGO PandaX up to fb8ff40f7ce5dfebdf66306c6d85625061faf7e5. This affects an unknown function of the file config.yml of the component JWT Secret Handler. The manipulation of the argument key results in use of hard-coded cryptographic key . The attack may be performed from remote. This attack is characterized by high complexity. The exploitability is reported as difficult. The exploit is now public and may be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Use of Hard-coded Cryptographic Key
Product status
Timeline
| 2025-12-26: | VulDB entry created |
| 2025-12-27: | Advisory disclosed |
| 2025-12-27: | VulDB entry last update |
Credits
28Hus (VulDB User)
References
vuldb.com/?id.338479 (VDB-338479 | PandaXGO PandaX JWT Secret config.yml hard-coded key)
vuldb.com/?ctiid.338479 (VDB-338479 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.711519 (Submit #711519 | https://github.com/PandaXGO https://github.com/PandaXGO/PandaX before commit fb8ff40f7ce5dfebdf66306c6d85625061faf7e5 (As of December 10, 2025) Authentication Bypass by Primary Weakness)
github.com/PandaXGO/PandaX/issues/9
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.