CVE-2025-6669
A vulnerability was found in gooaclok819 sublinkX up to 1.8. It has been declared as problematic. This vulnerability affects unknown code of the file middlewares/jwt.go. The manipulation with the input sublink leads to use of hard-coded cryptographic key
. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9 is able to address this issue. The patch is identified as 778d26aef723daa58df98c8060c43f5bf5d1b10b. It is recommended to upgrade the affected component.
. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9 is able to address this issue. The patch is identified as 778d26aef723daa58df98c8060c43f5bf5d1b10b. It is recommended to upgrade the affected component.
Vendor
-
Product
-
CWE
Yayın Tarihi
2025-06-25 23:15:21
Güncelleme
2025-06-27 11:15:25
Source Identifier
cna@vuldb.com
KEV Date Added
-
Kategoriler
Referanslar
https://github.com/gooaclok819/sublinkX/commit/778d26aef723daa58df98c8060c43f5bf5d1b10b
https://github.com/gooaclok819/sublinkX/issues/68
https://github.com/gooaclok819/sublinkX/issues/68#issuecomment-2957290524
https://github.com/gooaclok819/sublinkX/releases/tag/1.9
https://vuldb.com/?ctiid.313882
https://vuldb.com/?id.313882
https://vuldb.com/?submit.602368