Duplicate Advisory: Authentication Bypass via Default JWT Secret in NocoBase docker-compose Deployments
Low severity
GitHub Reviewed
Published
Dec 2, 2025
to the GitHub Advisory Database
•
Updated Dec 9, 2025
Withdrawn
This advisory was withdrawn on Dec 9, 2025
Description
Published by the National Vulnerability Database
Dec 2, 2025
Published to the GitHub Advisory Database
Dec 2, 2025
Reviewed
Dec 9, 2025
Withdrawn
Dec 9, 2025
Last updated
Dec 9, 2025
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-mv7p-34fv-4874. This link is maintained to preserve external references.
Original Description
A vulnerability was detected in nocobase up to 1.9.4/2.0.0-alpha.37. The affected element is an unknown function of the file nocobase\packages\core\auth\src\base\jwt-service.ts of the component JWT Service. The manipulation of the argument API_KEY results in use of hard-coded cryptographic key
. The attack can be launched remotely. A high complexity level is associated with this attack. The exploitability is described as difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References