| Title | https://github.com/MartialBE https://github.com/MartialBE/one-hub ≤ v0.14.27 Authentication Bypass by Primary Weakness |
|---|
| Description | Because the one-hub system uses Docker's one-click deployment feature, many operations and maintenance personnel directly use the default open-source session key. This allows attackers to easily forge JWTs and gain important system administrator privileges, including but not limited to obtaining sensitive data, adding and deleting users, and accessing OSS cloud keys. This poses a significant threat. |
|---|
| Source | ⚠️ https://github.com/MartialBE/one-hub/issues/872 |
|---|
| User | 28Hus (UID 92415) |
|---|
| Submission | 12/09/2025 15:05 (5 months ago) |
|---|
| Moderation | 12/13/2025 10:15 (4 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 336384 [MartialBE one-hub up to 0.14.27 docker-compose.yml SESSION_SECRET hard-coded key] |
|---|
| Points | 19 |
|---|