A vulnerability, which was classified as problematic, has been found in mao888 bluebell-plus up to 2.3.0. This issue affects some unknown processing of the file bluebell_backend/pkg/jwt/jwt.go of the component JWT Token Handler. The manipulation of the argument mySecret with the input bluebell-plus leads to use of hard-coded password. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
Metrics
Affected Vendors & Products
References
History
Sun, 06 Jul 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, which was classified as problematic, has been found in mao888 bluebell-plus up to 2.3.0. This issue affects some unknown processing of the file bluebell_backend/pkg/jwt/jwt.go of the component JWT Token Handler. The manipulation of the argument mySecret with the input bluebell-plus leads to use of hard-coded password. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. | |
Title | mao888 bluebell-plus JWT Token jwt.go hard-coded password | |
Weaknesses | CWE-255 CWE-259 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-07-06T12:32:05.291Z
Updated: 2025-07-06T12:32:05.291Z
Reserved: 2025-07-05T12:45:02.216Z
Link: CVE-2025-7079

No data.

Status : Received
Published: 2025-07-06T13:15:35.413
Modified: 2025-07-06T13:15:35.413
Link: CVE-2025-7079

No data.