Impact
A weakness in MineAdmin version 1.x and 2.x allows an attacker to manipulate the /system/refresh endpoint of the JWT Token Handler. The manipulation results in insufficient verification of data authenticity, meaning the server accepts forged or tampered JWT refresh requests. This is an instance of CWE‑345, which concerns insufficient verification of data authenticity. Such a flaw can enable a remote attacker to generate valid session tokens and gain unauthorized access to protected resources.
Affected Systems
The vulnerability affects all MineAdmin installations running versions 1.x and 2.x. The specific component impacted is the file "/system/refresh" in the JWT Token Handler module of the MineAdmin application.
Risk and Exploitability
The CVSS score is 2.3 and the EPSS score is below 1%, indicating low but non‑zero exploitation probability. The description notes high attack complexity and difficult exploitability, yet the exploit has been made publicly available. The vulnerability is not listed in the CISA KEV catalog, but the lack of vendor response suggests that a patch may not have been released. As a result, the risk to impacted environments persists until remediation is applied.
OpenCVE Enrichment
Github GHSA