A path traversal vulnerability in FastX3 thru 3.3.67 allows an unauthenticated attacker to read arbitrary files on the server. By leveraging this vulnerability, it is possible to access the application's configuration files, which contain the secret key used to sign JSON Web Tokens as well as existing JTIs. With this information, an attacker can forge valid JWTs, impersonate the root user, and achieve remote code execution in privileged context via authenticated endpoints.
History

Tue, 14 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-24
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Oct 2025 17:30:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability in FastX3 thru 3.3.67 allows an unauthenticated attacker to read arbitrary files on the server. By leveraging this vulnerability, it is possible to access the application's configuration files, which contain the secret key used to sign JSON Web Tokens as well as existing JTIs. With this information, an attacker can forge valid JWTs, impersonate the root user, and achieve remote code execution in privileged context via authenticated endpoints.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-14T18:26:10.184Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-57618

cve-icon Vulnrichment

Updated: 2025-10-14T18:26:04.304Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-14T18:15:36.190

Modified: 2025-10-14T19:35:56.913

Link: CVE-2025-57618

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.