. The attack is possible to be carried out remotely. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report and is planning to fix this flaw in an upcoming release.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-43h9-hc38-qph5 | SQLE's JWT Secret Handler can be manipulated to use hard-coded cryptographic key |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 31 Dec 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Actionsky
Actionsky sqle |
|
| Weaknesses | CWE-798 | |
| CPEs | cpe:2.3:a:actionsky:sqle:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Actionsky
Actionsky sqle |
Mon, 29 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Actiontech
Actiontech sqle |
|
| Vendors & Products |
Actiontech
Actiontech sqle |
Mon, 29 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 27 Dec 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in actiontech sqle up to 4.2511.0. The impacted element is an unknown function of the file sqle/utils/jwt.go of the component JWT Secret Handler. The manipulation of the argument JWTSecretKey leads to use of hard-coded cryptographic key . The attack is possible to be carried out remotely. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report and is planning to fix this flaw in an upcoming release. | |
| Title | actiontech sqle JWT Secret jwt.go hard-coded key | |
| Weaknesses | CWE-320 CWE-321 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-29T15:57:28.455Z
Reserved: 2025-12-26T23:07:40.119Z
Link: CVE-2025-15107
Updated: 2025-12-29T15:57:24.270Z
Status : Analyzed
Published: 2025-12-27T13:15:39.230
Modified: 2025-12-31T22:38:38.957
Link: CVE-2025-15107
No data.
OpenCVE Enrichment
Updated: 2025-12-29T23:04:00Z
Github GHSA