Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @nocobase/auth
  4. ›
  5. GHSA-644f-hrff-mf96

GHSA-644f-hrff-mf96: Duplicate Advisory: Authentication Bypass via Default JWT Secret in NocoBase docker-compose Deployments

December 2, 2025 (updated December 9, 2025)

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-mv7p-34fv-4874. This link is maintained to preserve external references.

Original Description

A vulnerability was detected in nocobase up to 1.9.4/2.0.0-alpha.37. The affected element is an unknown function of the file nocobase\packages\core\auth\src\base\jwt-service.ts of the component JWT Service. The manipulation of the argument API_KEY results in use of hard-coded cryptographic key . The attack can be launched remotely. A high complexity level is associated with this attack. The exploitability is described as difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

References

  • gist.github.com/H2u8s/f3ede60d7ecfe598ae452aa5a8fbb90d
  • github.com/advisories/GHSA-644f-hrff-mf96
  • nvd.nist.gov/vuln/detail/CVE-2025-13877
  • vuldb.com/?ctiid.334033
  • vuldb.com/?id.334033
  • vuldb.com/?submit.692205

Code Behaviors & Features

Detect and mitigate GHSA-644f-hrff-mf96 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.9.23

Fixed versions

  • 1.9.23

Solution

Upgrade to version 1.9.23 or above.

Impact 5.6 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Learn more about CVSS

Source file

npm/@nocobase/auth/GHSA-644f-hrff-mf96.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 14 Dec 2025 00:20:41 +0000.