Description
A vulnerability was found in demozx gf_cms 1.0/1.0.1. It has been classified as critical. This affects the function init of the file internal/logic/auth/auth.go of the component JWT Authentication. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.2 is able to address this issue. The patch is named be702ada7cb6fdabc02689d90b38139c827458a5. It is recommended to upgrade the affected component.
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.275199
Permissions Required, Third Party Advisory, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.275199
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.393981
Issue Tracking exploit
issue-tracking
https://github.com/demozx/gf_cms/issues/5
Issue Tracking issue-tracking
https://github.com/demozx/gf_cms/issues/5#issuecomment-2296590417
Scores
CVSS v3
7.3
EPSS
0.0036
EPSS Percentile
58.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-798
Status
published
Products (1)
demozx/gf_cms
1.0 - 1.0.2
Published
Aug 20, 2024
Tracked Since
Feb 18, 2026