Логотип exploitDog
bind:CVE-2025-30206
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-30206

Количество 3

Количество 3

nvd логотип

CVE-2025-30206

10 месяцев назад

Dpanel is a Docker visualization panel system which provides complete Docker management functions. The Dpanel service contains a hardcoded JWT secret in its default configuration, allowing attackers to generate valid JWT tokens and compromise the host machine. This security flaw allows attackers to analyze the source code, discover the embedded secret, and craft legitimate JWT tokens. By forging these tokens, an attacker can successfully bypass authentication mechanisms, impersonate privileged users, and gain unauthorized administrative access. Consequently, this enables full control over the host machine, potentially leading to severe consequences such as sensitive data exposure, unauthorized command execution, privilege escalation, or further lateral movement within the network environment. This issue is patched in version 1.6.1. A workaround for this vulnerability involves replacing the hardcoded secret with a securely generated value and load it from secure configuration storage.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-j752-cjcj-w847

10 месяцев назад

Dpanel's hard-coded JWT secret leads to remote code execution

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2026-00159

10 месяцев назад

Уязвимость панели визуального управления для Docker Dpanel, связанная с использованием жестко закодированного криптографического ключа, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-30206

Dpanel is a Docker visualization panel system which provides complete Docker management functions. The Dpanel service contains a hardcoded JWT secret in its default configuration, allowing attackers to generate valid JWT tokens and compromise the host machine. This security flaw allows attackers to analyze the source code, discover the embedded secret, and craft legitimate JWT tokens. By forging these tokens, an attacker can successfully bypass authentication mechanisms, impersonate privileged users, and gain unauthorized administrative access. Consequently, this enables full control over the host machine, potentially leading to severe consequences such as sensitive data exposure, unauthorized command execution, privilege escalation, or further lateral movement within the network environment. This issue is patched in version 1.6.1. A workaround for this vulnerability involves replacing the hardcoded secret with a securely generated value and load it from secure configuration storage.

CVSS3: 9.8
0%
Низкий
10 месяцев назад
github логотип
GHSA-j752-cjcj-w847

Dpanel's hard-coded JWT secret leads to remote code execution

CVSS3: 9.8
0%
Низкий
10 месяцев назад
fstec логотип
BDU:2026-00159

Уязвимость панели визуального управления для Docker Dpanel, связанная с использованием жестко закодированного криптографического ключа, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 9.8
0%
Низкий
10 месяцев назад

Уязвимостей на страницу