CVE-2025-47945
17.05.2025, 19:15
Donetick an open-source app for managing tasks and chores. Prior to version 0.1.44, the application uses JSON Web Tokens (JWT) for authentication, but the signing secret has a weak default value. While the responsibility is left to the system administrator to change it, this approach is inadequate. The vulnerability is proven by existence of the issue in the live version as well. This issue can result in full account takeover of any user. Version 0.1.44 contains a patch.Enginsight
Vendor | Product | Version |
---|---|---|
donetick | donetick | 𝑥 < 0.1.44 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-453 - Insecure Default Variable InitializationThe software, by default, initializes an internal variable with an insecure or less secure value than is possible.
- CWE-1188 - Insecure Default Initialization of ResourceThe software initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.
References