Description
A vulnerability was determined in hcengineering Huly Platform 0.7.382. Affected by this issue is some unknown functionality of the file foundations/core/packages/token/src/token.ts of the component JWT Token Handler. This manipulation of the argument SERVER_SECRET with the input secret causes use of hard-coded cryptographic key
. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-06
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Token Forgery
Action: Patch Immediately
AI Analysis

Impact

The flaw originates from a hard‑coded cryptographic key embedded in the JWT Token Handler of hcengineering Huly Platform 0.7.382. Because the key is stored in foundations/core/packages/token/src/token.ts and can be influenced through the SERVER_SECRET argument, an attacker who can interact with the system remotely can force the application to sign tokens with this predictable key. This enables the forging of valid JSON Web Tokens, potentially allowing an attacker to gain unauthorized access, elevate privileges, or impersonate legitimate users, thereby compromising confidentiality and integrity.

Affected Systems

The vulnerability affects hcengineering Huly Platform version 0.7.382 only, within the token.ts file of the JWT Token Handler component. No other product versions are explicitly listed as impacted.

Risk and Exploitability

The CVSS score of 6.3 indicates moderate severity. However, the presence of a hard‑coded key makes the vulnerability considerably dangerous if leveraged. Exploitation requires remote interaction and is classified as high complexity, with no widely available proof‑of‑concept at present. As the vendor has not released a fix and the issue is not listed in the KEV catalog, administrators should treat this as a high‑priority risk and diligently monitor for updates.

Generated by OpenCVE AI on April 6, 2026 at 07:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify that the vendor has issued a patch or release note addressing the hard‑coded key issue.
  • If no patch is available, replace the embedded key by loading the JWT secret from a secure environment variable or external configuration file.
  • Enforce strict access controls on the stored secret and rotate it regularly to limit exposure.
  • Add validation logic to reject tokens signed with the default hard‑coded key to prevent forgery.
  • Monitor authentication logs for unusual token usage patterns that may indicate an attack.

Generated by OpenCVE AI on April 6, 2026 at 07:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Hcengineering
Hcengineering huly
Vendors & Products Hcengineering
Hcengineering huly

Mon, 06 Apr 2026 05:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in hcengineering Huly Platform 0.7.382. Affected by this issue is some unknown functionality of the file foundations/core/packages/token/src/token.ts of the component JWT Token Handler. This manipulation of the argument SERVER_SECRET with the input secret causes use of hard-coded cryptographic key . The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Title hcengineering Huly Platform JWT Token token.ts hard-coded key
Weaknesses CWE-320
CWE-321
References
Metrics cvssV2_0

{'score': 2.6, 'vector': 'AV:N/AC:H/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.7, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Hcengineering Huly
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T03:01:32.473Z

Reserved: 2026-04-05T16:06:11.825Z

Link: CVE-2026-5622

cve-icon Vulnrichment

Updated: 2026-04-07T03:01:28.256Z

cve-icon NVD

Status : Deferred

Published: 2026-04-06T05:16:02.650

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5622

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:47:25Z

Weaknesses