| Title | https://github.com/PandaXGO https://github.com/PandaXGO/PandaX before commit fb8ff40f7ce5dfebdf66306c6d85625061faf7e5 (As of December 10, 2025) Authentication Bypass by Primary Weakness |
|---|
| Description | PandaX uses a hard-coded JWT authentication key, and the authentication field logic in the authentication mechanism is insecure, allowing attackers to easily forge super administrator credentials and take over the entire system. |
|---|
| Source | ⚠️ https://github.com/PandaXGO/PandaX/issues/9 |
|---|
| User | 28Hus (UID 92415) |
|---|
| Submission | 12/10/2025 04:22 AM (3 months ago) |
|---|
| Moderation | 12/27/2025 12:10 AM (17 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 338479 [PandaXGO PandaX up to fb8ff40f7ce5dfebdf66306c6d85625061faf7e5 JWT Secret config.yml key hard-coded key] |
|---|
| Points | 16 |
|---|