CVE-2025-6669

LOW

gooaclok819 sublinkX <1.8 - Code Injection

Title source: llm
STIX 2.1

Description

A vulnerability was found in gooaclok819 sublinkX up to 1.8. It has been declared as problematic. This vulnerability affects unknown code of the file middlewares/jwt.go. The manipulation with the input sublink leads to use of hard-coded cryptographic key . The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9 is able to address this issue. The patch is identified as 778d26aef723daa58df98c8060c43f5bf5d1b10b. It is recommended to upgrade the affected component.

Scores

CVSS v3 3.7
EPSS 0.0026
EPSS Percentile 49.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-320 CWE-321
Status published
Products (10)
gooaclok819/sublinkX 1.0
gooaclok819/sublinkX 1.1
gooaclok819/sublinkX 1.2
gooaclok819/sublinkX 1.3
gooaclok819/sublinkX 1.4
gooaclok819/sublinkX 1.5
gooaclok819/sublinkX 1.6
gooaclok819/sublinkX 1.7
gooaclok819/sublinkX 1.8
gooaclok819/sublinkX 1.9
Published Jun 25, 2025
Tracked Since Feb 18, 2026