CVE-2025-7080
LOWDone-0 Jank <322caebbad10568460364b9667aa62c3080bfc17 - Use After Free
Title source: llmDescription
A vulnerability, which was classified as problematic, was found in Done-0 Jank up to 322caebbad10568460364b9667aa62c3080bfc17. Affected is an unknown function of the file internal/utils/jwt_utils.go of the component JWT Token Handler. The manipulation of the argument accessSecret/refreshSecret with the input jank-blog-secret/jank-blog-refresh-secret leads to use of hard-coded password. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
Scores
CVSS v3
3.7
EPSS
0.0006
EPSS Percentile
17.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-255
CWE-259
Status
published
Products (1)
Done-0/Jank
322caebbad10568460364b9667aa62c3080bfc17
Published
Jul 06, 2025
Tracked Since
Feb 18, 2026