CVE-2025-41702
Published: 26 August 2025
Summary
CVE-2025-41702 is a critical-severity Use of Hard-coded Cryptographic Key (CWE-321) vulnerability in Certvde (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 47.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SC-12 (Cryptographic Key Establishment and Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SC-12 requires establishment and management of cryptographic keys preventing hard-coded secrets like the exposed JWT key used for HS256 token signing.
SI-2 mandates identification, reporting, and correction of flaws such as the hard-coded JWT secret enabling authentication bypass.
AC-6 enforces least privilege preventing default users from accessing and reading the embedded JWT secret key in the backend.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hard-coded JWT secret in public-facing WebGUI directly enables remote forgery of valid auth tokens (T1606) to bypass authentication on an exposed application (T1190).
NVD Description
The JWT secret key is embedded in the egOS WebGUI backend and is readable to the default user. An unauthenticated remote attacker can generate valid HS256 tokens and bypass authentication/authorization due to the use of hard-coded cryptographic key.
Deeper analysisAI
CVE-2025-41702 is a critical vulnerability in the egOS WebGUI backend, where the JWT secret key is hard-coded and embedded in the code, making it readable to the default user. This flaw, classified under CWE-321 (Use of Hard-coded Cryptographic Key), enables the generation of valid HS256 tokens due to the exposed secret, compromising the authentication and authorization mechanisms. The vulnerability was published on 2025-08-26 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
An unauthenticated remote attacker can exploit this vulnerability by accessing the exposed JWT secret key from the egOS WebGUI backend and using it to craft arbitrary valid HS256 tokens. Successful exploitation allows the attacker to bypass authentication and authorization controls, potentially gaining full unauthorized access to the system.
Mitigation details are provided in the advisory VDE-2025-076 at https://certvde.com/de/advisories/VDE-2025-076.
Details
- CWE(s)