A path traversal vulnerability in FastX3 thru 3.3.67 allows an unauthenticated attacker to read arbitrary files on the server. By leveraging this vulnerability, it is possible to access the application's configuration files, which contain the secret key used to sign JSON Web Tokens as well as existing JTIs. With this information, an attacker can forge valid JWTs, impersonate the root user, and achieve remote code execution in privileged context via authenticated endpoints.
References
Configurations
No configuration.
History
14 Oct 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-24 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
14 Oct 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-14 18:15
Updated : 2025-10-14 19:35
NVD link : CVE-2025-57618
Mitre link : CVE-2025-57618
CVE.ORG link : CVE-2025-57618
JSON object : View
Products Affected
No product.
CWE
CWE-24
Path Traversal: '../filedir'
