提交 #713990: joey-zhou xiaozhi-esp32-server-java V3.0.0 Improper Authentication信息

标题joey-zhou xiaozhi-esp32-server-java V3.0.0 Improper Authentication
描述Xiaozhi ESP32 Server Java V3.0.0 (the latest version) contains an authentication bypass vulnerability. Attackers can exploit the access whitelist set by the developer to obtain sensitive user information and forge cookies to impersonate any user login. Project address:https://github.com/joey-zhou/xiaozhi-esp32-server-java Scope of impact: Several companies have been found to have deployed this service. The ICO can be used as a fingerprint for searching.
来源⚠️ https://github.com/joey-zhou/xiaozhi-esp32-server-java/issues/143
用户
 zzdzz (UID 93061)
提交2025-12-12 08時24分 (4 月前)
管理2025-12-27 10時53分 (15 days later)
状态已接受
VulDB条目338513 [joey-zhou xiaozhi-esp32-server-java 直到 3.0.0 Cookie AuthenticationInterceptor.java tryAuthenticateWithCookies 弱身份验证]
积分20

Want to know what is going to be exploited?

We predict KEV entries!