A security vulnerability has been detected in actiontech sqle up to 4.2511.0. The impacted element is an unknown function of the file sqle/utils/jwt.go of the component JWT Secret Handler. The manipulation of the argument JWTSecretKey leads to use of hard-coded cryptographic key
. The attack is possible to be carried out remotely. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report and is planning to fix this flaw in an upcoming release.
References
| Link | Resource |
|---|---|
| https://github.com/actiontech/sqle/issues/3186 | Exploit Third Party Advisory |
| https://github.com/actiontech/sqle/milestone/53 | Exploit |
| https://vuldb.com/?ctiid.338478 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338478 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.710380 | Third Party Advisory VDB Entry |
Configurations
History
31 Dec 2025, 22:38
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/actiontech/sqle/issues/3186 - Exploit, Third Party Advisory | |
| References | () https://github.com/actiontech/sqle/milestone/53 - Exploit | |
| References | () https://vuldb.com/?ctiid.338478 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.338478 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.710380 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:a:actionsky:sqle:*:*:*:*:*:*:*:* | |
| CWE | CWE-798 | |
| First Time |
Actionsky
Actionsky sqle |
27 Dec 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-27 13:15
Updated : 2025-12-31 22:38
NVD link : CVE-2025-15107
Mitre link : CVE-2025-15107
CVE.ORG link : CVE-2025-15107
JSON object : View
Products Affected
actionsky
- sqle
