A path traversal vulnerability in FastX3 thru 3.3.67 allows an unauthenticated attacker to read arbitrary files on the server. By leveraging this vulnerability, it is possible to access the application's configuration files, which contain the secret key used to sign JSON Web Tokens as well as existing JTIs. With this information, an attacker can forge valid JWTs, impersonate the root user, and achieve remote code execution in privileged context via authenticated endpoints.
Metrics
Affected Vendors & Products
References
History
Tue, 14 Oct 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-24 | |
Metrics |
cvssV3_1
|
Tue, 14 Oct 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A path traversal vulnerability in FastX3 thru 3.3.67 allows an unauthenticated attacker to read arbitrary files on the server. By leveraging this vulnerability, it is possible to access the application's configuration files, which contain the secret key used to sign JSON Web Tokens as well as existing JTIs. With this information, an attacker can forge valid JWTs, impersonate the root user, and achieve remote code execution in privileged context via authenticated endpoints. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-14T18:26:10.184Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57618

Updated: 2025-10-14T18:26:04.304Z

Status : Awaiting Analysis
Published: 2025-10-14T18:15:36.190
Modified: 2025-10-14T19:35:56.913
Link: CVE-2025-57618

No data.

No data.