Submit #710249: https://github.com/MartialBE https://github.com/MartialBE/one-hub ≤ v0.14.27 Authentication Bypass by Primary Weaknessinfo

Titlehttps://github.com/MartialBE https://github.com/MartialBE/one-hub ≤ v0.14.27 Authentication Bypass by Primary Weakness
DescriptionBecause the one-hub system uses Docker's one-click deployment feature, many operations and maintenance personnel directly use the default open-source session key. This allows attackers to easily forge JWTs and gain important system administrator privileges, including but not limited to obtaining sensitive data, adding and deleting users, and accessing OSS cloud keys. This poses a significant threat.
Source⚠️ https://github.com/MartialBE/one-hub/issues/872
User
 28Hus (UID 92415)
Submission12/09/2025 15:05 (5 months ago)
Moderation12/13/2025 10:15 (4 days later)
StatusAccepted
VulDB entry336384 [MartialBE one-hub up to 0.14.27 docker-compose.yml SESSION_SECRET hard-coded key]
Points19

Do you know our Splunk app?

Download it now for free!