A security vulnerability has been detected in actiontech sqle up to 4.2511.0. The impacted element is an unknown function of the file sqle/utils/jwt.go of the component JWT Secret Handler. The manipulation of the argument JWTSecretKey leads to use of hard-coded cryptographic key
. The attack is possible to be carried out remotely. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report and is planning to fix this flaw in an upcoming release.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-43h9-hc38-qph5 SQLE's JWT Secret Handler can be manipulated to use hard-coded cryptographic key
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 31 Dec 2025 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Actionsky
Actionsky sqle
Weaknesses CWE-798
CPEs cpe:2.3:a:actionsky:sqle:*:*:*:*:*:*:*:*
Vendors & Products Actionsky
Actionsky sqle

Mon, 29 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Actiontech
Actiontech sqle
Vendors & Products Actiontech
Actiontech sqle

Mon, 29 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 27 Dec 2025 13:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in actiontech sqle up to 4.2511.0. The impacted element is an unknown function of the file sqle/utils/jwt.go of the component JWT Secret Handler. The manipulation of the argument JWTSecretKey leads to use of hard-coded cryptographic key . The attack is possible to be carried out remotely. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report and is planning to fix this flaw in an upcoming release.
Title actiontech sqle JWT Secret jwt.go hard-coded key
Weaknesses CWE-320
CWE-321
References
Metrics cvssV2_0

{'score': 2.6, 'vector': 'AV:N/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.7, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-12-29T15:57:28.455Z

Reserved: 2025-12-26T23:07:40.119Z

Link: CVE-2025-15107

cve-icon Vulnrichment

Updated: 2025-12-29T15:57:24.270Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-27T13:15:39.230

Modified: 2025-12-31T22:38:38.957

Link: CVE-2025-15107

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-29T23:04:00Z

Weaknesses