Authentication Bypass via Hardcoded Credentials GoAway up to v0.62.18, fixed in 0.62.19, uses a hardcoded secret for signing JWT tokens used for authentication.
References
Configurations
History
11 Dec 2025, 18:01
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pommee goaway
Pommee |
|
| CPE | cpe:2.3:a:pommee:goaway:*:*:*:*:*:*:*:* | |
| References | () https://github.com/gian2dchris/CVEs/tree/CVE-2025-65730/CVE-2025-65730 - Exploit, Third Party Advisory | |
| References | () https://github.com/pommee/goaway/blob/v0.62.18/backend/api/auth.go#L48 - Product | |
| References | () https://github.com/pommee/goaway/blob/v0.62.18/backend/api/middleware.go#L110 - Product | |
| References | () https://github.com/pommee/goaway/blob/v0.62.18/backend/api/middleware.go#L15 - Product | |
| References | () https://github.com/pommee/goaway/blob/v0.62.18/backend/api/middleware.go#L40 - Product | |
| References | () https://github.com/pommee/goaway/blob/v0.62.18/backend/api/middleware.go#L69 - Product | |
| References | () https://github.com/pommee/goaway/blob/v0.62.18/backend/api/middleware.go#L88 - Product | |
| References | () https://github.com/pommee/goaway/commit/5769f8782b7453ca1c22a201b224b5ce48532f64#diff-4ddfd6cf1311ddfd45734bb1dc53bc208df69584ba92ac4f38866bd558434678L15-L40 - Product | |
| References | () https://github.com/pommee/goaway/releases/tag/v0.62.16 - Release Notes |
08 Dec 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-798 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
05 Dec 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-05 16:15
Updated : 2025-12-11 18:01
NVD link : CVE-2025-65730
Mitre link : CVE-2025-65730
CVE.ORG link : CVE-2025-65730
JSON object : View
Products Affected
pommee
- goaway
CWE
CWE-798
Use of Hard-coded Credentials
