Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2r8f-cf6w-x5vq | FUXA contains a hard-coded credential vulnerability |
Github GHSA |
GHSA-c8m8-3jcr-6rj5 | FUXA has a hardcoded fallback JWT signing secret |
Tue, 10 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-798 | |
| CPEs | cpe:2.3:a:frangoteam:fuxa:1.2.7:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 05 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Frangoteam
Frangoteam fuxa |
|
| Vendors & Products |
Frangoteam
Frangoteam fuxa |
Tue, 03 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FUXA v1.2.7 contains a hard-coded credential vulnerability in server/api/jwt-helper.js. The application uses a hard-coded secret key to sign and verify JWT Tokens. This allows remote attackers to forge valid admin tokens and bypass authentication to gain full administrative access. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-28T02:59:59.337Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-69971
Updated: 2026-02-05T15:00:12.757Z
Status : Modified
Published: 2026-02-03T18:16:17.370
Modified: 2026-02-28T04:16:17.690
Link: CVE-2025-69971
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:17:26Z
Github GHSA