Impact
A flaw in rachelos WeRSS we-mp-rss allows an attacker to manipulate the SECRET_KEY argument used by the JWT handler so that the default cryptographic key is employed. This requires a remote request that specifies the altered key value. The vulnerability was rated as having high complexity and difficult exploitability, but the exploit code is publicly available.
Affected Systems
The issue affects the rachelos WeRSS we-mp-rss product for all releases up to and including version 1.4.8. No other versions or variants are known to be affected.
Risk and Exploitability
The vulnerability carries a CVSS score of 6.3, indicating moderate severity, while the EPSS score is below 1%, reflecting a low probability of exploitation. The vulnerability is not currently listed in the CISA KEV catalog. An attacker can remotely bypass authentication by exploiting the default key, potentially allowing unauthorized access to protected resources.
OpenCVE Enrichment