Home

Description

SOCFortress CoPilot focuses on providing a single pane of glass for all your security operations needs. Prior to 0.1.57, SOCFortress CoPilot ships a hardcoded JWT signing secret as a fallback value in backend/app/auth/utils.py:28 and ships it verbatim in .env.example. Any deployment where JWT_SECRET is not explicitly set — including the default Docker Compose setup — signs all authentication tokens with this publicly known value. An unauthenticated attacker can forge arbitrary admin-scoped JWTs and gain full control of the application and every security tool it manages without any credentials. This vulnerability is fixed in 0.1.57.

PUBLISHED Reserved 2026-04-30 | Published 2026-05-11 | Updated 2026-05-11 | Assigner GitHub_M




CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-287: Improper Authentication

CWE-522: Insufficiently Protected Credentials

CWE-798: Use of Hard-coded Credentials

Product status

< 0.1.57
affected

References

github.com/...oPilot/security/advisories/GHSA-4gxj-hw3c-3x2x

github.com/socfortress/CoPilot/pull/814

github.com/...ommit/4640511a0cf2e7b144a71375b5b349a8318cb186

cve.org (CVE-2026-42869)

nvd.nist.gov (CVE-2026-42869)

Download JSON