. It is possible to launch the attack remotely. Attacks of this nature are highly complex. The exploitability is reported as difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 05 Oct 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was identified in CRMEB up to 5.6.1. This affects an unknown function of the component JWT HMAC Secret Handler. Such manipulation of the argument secret with the input default leads to use of hard-coded cryptographic key . It is possible to launch the attack remotely. Attacks of this nature are highly complex. The exploitability is reported as difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | CRMEB JWT HMAC Secret hard-coded key | |
Weaknesses | CWE-320 CWE-321 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-05T11:32:04.828Z
Reserved: 2025-10-04T18:30:50.805Z
Link: CVE-2025-11290

No data.

Status : Received
Published: 2025-10-05T12:15:31.063
Modified: 2025-10-05T12:15:31.063
Link: CVE-2025-11290

No data.

No data.