Metrics
Affected Vendors & Products
Fri, 27 Jun 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 27 Jun 2025 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 26 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 25 Jun 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in gooaclok819 sublinkX up to 1.8. It has been declared as problematic. This vulnerability affects unknown code of the file middlewares/jwt.go. The manipulation with the input sublink leads to use of hard-coded cryptographic key . The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9 is able to address this issue. The patch is identified as 778d26aef723daa58df98c8060c43f5bf5d1b10b. It is recommended to upgrade the affected component. | |
Title | gooaclok819 sublinkX jwt.go hard-coded key | |
Weaknesses | CWE-320 CWE-321 |
|
References |
|
|
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-06-25T22:31:07.546Z
Updated: 2025-07-01T13:33:29.686Z
Reserved: 2025-06-25T14:58:47.431Z
Link: CVE-2025-6669

Updated: 2025-06-26T13:32:47.381Z

Status : Awaiting Analysis
Published: 2025-06-25T23:15:21.310
Modified: 2025-06-27T11:15:25.547
Link: CVE-2025-6669

No data.