Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @nocobase/auth
  4. ›
  5. CVE-2025-13877

CVE-2025-13877: Authentication Bypass via Default JWT Secret in NocoBase docker-compose Deployments

December 9, 2025

CVE-2025-13877 is an authentication bypass vulnerability caused by insecure default JWT key usage in NocoBase Docker deployments.

Because the official one-click Docker deployment configuration historically provided a public default JWT key, attackers can forge valid JWT tokens without possessing any legitimate credentials. By constructing a token with a known userId (commonly the administrator account), an attacker can directly bypass authentication and authorization checks.

Successful exploitation allows an attacker to:

  • Bypass authentication entirely
  • Impersonate arbitrary users
  • Gain full administrator privileges
  • Access sensitive business data
  • Create, modify, or delete users
  • Access cloud storage credentials and other protected secrets

The vulnerability is remotely exploitable, requires no authentication, and public proof-of-concept exploits are available. This issue is functionally equivalent in impact to other JWT secret exposure vulnerabilities such as CVE-2024-43441 and CVE-2025-30206.

Deployments that used the default Docker configuration without explicitly overriding the JWT secret are affected.


References

  • docs.nocobase.com/welcome/getting-started/installation/docker-compose
  • gist.github.com/H2u8s/f3ede60d7ecfe598ae452aa5a8fbb90d
  • github.com/advisories/GHSA-mv7p-34fv-4874
  • github.com/nocobase/nocobase
  • github.com/nocobase/nocobase/blob/main/docker/app-mariadb/docker-compose.yml
  • github.com/nocobase/nocobase/blob/main/docker/app-mysql/docker-compose.yml
  • github.com/nocobase/nocobase/blob/main/docker/app-postgres/docker-compose.yml
  • github.com/nocobase/nocobase/blob/main/docker/app-sqlite/docker-compose.yml
  • github.com/nocobase/nocobase/commit/de4292ea7847dd26c6306445091769f8b9ee96d5
  • github.com/nocobase/nocobase/security/advisories/GHSA-mv7p-34fv-4874
  • nvd.nist.gov/vuln/detail/CVE-2025-13877
  • v2.docs.nocobase.com/get-started/installation/docker
  • vuldb.com/?ctiid.334033
  • vuldb.com/?id.334033
  • vuldb.com/?submit.692205

Code Behaviors & Features

Detect and mitigate CVE-2025-13877 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.9.0-beta.18, all versions starting from 1.9.0 before 1.9.23, all versions starting from 2.0.0-alpha.1 before 2.0.0-alpha.52

Fixed versions

  • 1.9.23
  • 1.9.0-beta.18
  • 2.0.0-alpha.52

Solution

Upgrade to versions 1.9.0-beta.18, 1.9.23, 2.0.0-alpha.52 or above.

Impact 5.6 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-1320: Improper Protection for Outbound Error Messages and Alert Signals
  • CWE-321: Use of Hard-coded Cryptographic Key

Source file

npm/@nocobase/auth/CVE-2025-13877.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 14 Dec 2025 00:19:25 +0000.