CVE-2025-7080

LOW

Done-0 Jank <322caebbad10568460364b9667aa62c3080bfc17 - Use After Free

Title source: llm
STIX 2.1

Description

A vulnerability, which was classified as problematic, was found in Done-0 Jank up to 322caebbad10568460364b9667aa62c3080bfc17. Affected is an unknown function of the file internal/utils/jwt_utils.go of the component JWT Token Handler. The manipulation of the argument accessSecret/refreshSecret with the input jank-blog-secret/jank-blog-refresh-secret leads to use of hard-coded password. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.

Scores

CVSS v3 3.7
EPSS 0.0006
EPSS Percentile 17.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-255 CWE-259
Status published
Products (1)
Done-0/Jank 322caebbad10568460364b9667aa62c3080bfc17
Published Jul 06, 2025
Tracked Since Feb 18, 2026