Description
A weakness has been identified in joey-zhou xiaozhi-esp32-server-java up to 3.0.0. This impacts the function tryAuthenticateWithCookies of the file AuthenticationInterceptor.java of the component Cookie Handler. Executing manipulation can lead to improper authentication. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. Upgrading to version 4.0.0 will fix this issue. It is recommended to upgrade the affected component.
Problem types
Product status
4.0.0
Timeline
| 2025-12-27: | Advisory disclosed |
| 2025-12-27: | VulDB entry created |
| 2025-12-27: | VulDB entry last update |
Credits
zzdzz (VulDB User)
References
vuldb.com/?id.338513 (VDB-338513 | joey-zhou xiaozhi-esp32-server-java Cookie AuthenticationInterceptor.java tryAuthenticateWithCookies improper authentication)
vuldb.com/?ctiid.338513 (VDB-338513 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.713990 (Submit #713990 | joey-zhou xiaozhi-esp32-server-java V3.0.0 Improper Authentication)
github.com/joey-zhou/xiaozhi-esp32-server-java/issues/143
github.com/joey-zhou/xiaozhi-esp32-server-java/issues/143
github.com/joey-zhou/xiaozhi-esp32-server-java/issues/143
github.com/.../xiaozhi-esp32-server-java/releases/tag/v4.0.0
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.