Cyber Posture

CVE-2025-8974

LowPublic PoC

Published: 14 August 2025

Published
14 August 2025
Modified
29 April 2026
KEV Added
Patch
CVSS Score 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS Score 0.0029 52.4th percentile
Risk Priority 8 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-8974 is a low-severity Use of Hard-coded Password (CWE-259) vulnerability in Linlinjava Litemall. Its CVSS base score is 3.7 (Low).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 47.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 4 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-259 CWE-798

Changing default authenticators prior to first use directly prevents use of hard-coded passwords.

addresses: CWE-798 CWE-259

Intelligence programs surface reports of campaigns that abuse hard-coded credentials in products, prompting removal or replacement and thereby reducing successful exploitation.

addresses: CWE-798 CWE-259

Vetting reduces the chance a developer will deliberately insert hard-coded credentials as a backdoor or unauthorized access mechanism.

addresses: CWE-798 CWE-259

Supplier risk reviews identify and discourage hard-coded credentials in delivered products or services.

addresses: CWE-798

Enables users to notice when hard-coded credentials have been exploited for unauthorized access.

addresses: CWE-798

Security training explicitly warns against hard-coded credentials, lowering their use in systems.

addresses: CWE-798

Policy and procedures prohibit hard-coded credentials in favor of managed authentication.

addresses: CWE-798

External identity providers eliminate the need for hard-coded credentials in applications.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1134.001 Token Impersonation/Theft Stealth
Adversaries may duplicate then impersonate another user's existing token to escalate privileges and bypass access controls.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Hard-coded JWT secret in public source code enables remote attackers to forge valid authentication tokens for unauthorized access, impersonation, privilege escalation, exploitation of the public-facing web application, and leveraging unsecured credentials from files.

NVD Description

A vulnerability was determined in linlinjava litemall up to 1.8.0. Affected by this issue is some unknown functionality of the file litemall-wx-api/src/main/java/org/linlinjava/litemall/wx/util/JwtHelper.java of the component JSON Web Token Handler. The manipulation of the argument SECRET with the input X-Litemall-Token leads…

more

to hard-coded credentials. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.

Deeper analysisAI

CVE-2025-8974 is a vulnerability in linlinjava litemall versions up to 1.8.0, affecting an unknown functionality in the file litemall-wx-api/src/main/java/org/linlinjava/litemall/wx/util/JwtHelper.java within the JSON Web Token Handler component. The issue involves hard-coded credentials, specifically through manipulation of the SECRET argument using the X-Litemall-Token input, as classified under CWE-259 and CWE-798. It carries a CVSS v3.1 base score of 3.7 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N), indicating low severity with network accessibility but high attack complexity and limited integrity impact.

Remote attackers with no required privileges can exploit this vulnerability, though the high complexity makes exploitation difficult. Successful attacks enable limited integrity impacts, such as potential tampering via the hard-coded credentials in JWT handling, without affecting confidentiality or availability.

Advisories and discussions on mitigation are detailed in GitHub issues at https://github.com/linlinjava/litemall/issues/568 and https://github.com/linlinjava/litemall/issues/568#issue-3289860066, along with VulDB entries at https://vuldb.com/?ctiid.319970, https://vuldb.com/?id.319970, and https://vuldb.com/?submit.628233. The exploit has been publicly disclosed and may be usable.

Details

CWE(s)

Affected Products

linlinjava
litemall
≤ 1.8.0

CVEs Like This One

CVE-2025-8730Shared CWE-259, CWE-798
CVE-2025-11126Shared CWE-259, CWE-798
CVE-2026-6574Shared CWE-259, CWE-798
CVE-2026-7579Shared CWE-259, CWE-798
CVE-2026-2616Shared CWE-259, CWE-798
CVE-2026-4475Shared CWE-259, CWE-798
CVE-2025-2343Shared CWE-259, CWE-798
CVE-2026-1610Shared CWE-259, CWE-798
CVE-2026-8032Shared CWE-259, CWE-798
CVE-2025-40537Shared CWE-798

References