CVE-2025-41702

The JWT secret key is embedded in the egOS WebGUI backend and is readable to the default user. An unauthenticated remote attacker can generate valid HS256 tokens and bypass authentication/authorizatio ...

Continue Reading
Linux Distros Unpatched Vulnerability : CVE-2021-22190

The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available. A path traversal vulnerability via the GitLab Workhorse in all v ...

Continue Reading
Linux Distros Unpatched Vulnerability : CVE-2020-26892

The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available. The JWT library in NATS nats-server before 2.1.9 has Incorrect A ...

Continue Reading
GHSA-26RV-H2HF-3FW4 Payload’s SQLite adapter Session Fixation vulnerability

A Session Fixation vulnerability existed in Payload's SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT ...

Continue Reading
GHSA-5V66-M237-HWF7 Payload does not invalidate JWTs after log out

Payload uses JSON Web Tokens (JWT) for authentication. After log out JWT is not invalidated, which allows an attacker who has stolen or intercepted token to freely reuse it until expiration date (whic ...

Continue Reading
Payload’s SQLite adapter Session Fixation vulnerability

A Session Fixation vulnerability existed in Payload's SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT ...

Continue Reading
Payload does not invalidate JWTs after log out

Payload uses JSON Web Tokens (JWT) for authentication. After log out JWT is not invalidated, which allows an attacker who has stolen or intercepted token to freely reuse it until expiration date (whic ...

Continue Reading
CVE-2025-4644

A Session Fixation vulnerability existed in Payload's SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT ...

Continue Reading

Back to Main

Subscribe for the latest news: