Description
The JWT secret key is embedded in the egOS WebGUI backend and is readable to the default user. An unauthenticated remote attacker can generate valid HS256 tokens and bypass authentication/authorization due to the use of hard-coded cryptographic key.
Problem types
CWE-321 Use of Hard-coded Cryptographic Key
Product status
0.0.0 before v1.7.7
v1.8.0 before v1.8.2
0.0.0 before v1.7.7
v1.8.0 before v1.8.2
0.0.0 before v1.7.7
v1.8.0 before v1.8.2
0.0.0 before v1.7.7
v1.8.0 before v1.8.2
0.0.0 before v1.7.7
v1.8.0 before v1.8.2
0.0.0 before v1.7.7
v1.8.0 before v1.8.2
0.0.0 before v1.7.7
v1.8.0 before v1.8.2
0.0.0 before v1.7.7
v1.8.0 before v1.8.2
0.0.0 before v1.7.7
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
0.0.0 before
v1.8.0 before v1.8.2
References
certvde.com/de/advisories/VDE-2025-076