An insufficiently secured internal function allows session generation for arbitrary users. The decodeParam function checks the JWT but does not verify which signing algorithm was used. As a result, an attacker can use the "ex:action" parameter in the VerifyUserByThrustedService function to generate a session for any user.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://cert.pl/en/posts/2025/08/CVE-2025-2313/ |
Configurations
No configuration.
History
29 Aug 2025, 16:24
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 Aug 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-27 11:15
Updated : 2025-08-29 16:24
NVD link : CVE-2025-30064
Mitre link : CVE-2025-30064
CVE.ORG link : CVE-2025-30064
JSON object : View
Products Affected
No product.