Export limit exceeded: 349971 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Export limit exceeded: 349971 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Export limit exceeded: 349971 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (1 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2026-42869 | 1 Socfortress | 1 Copilot | 2026-05-12 | 10 Critical |
| SOCFortress CoPilot focuses on providing a single pane of glass for all your security operations needs. Prior to 0.1.57, SOCFortress CoPilot ships a hardcoded JWT signing secret as a fallback value in backend/app/auth/utils.py:28 and ships it verbatim in .env.example. Any deployment where JWT_SECRET is not explicitly set — including the default Docker Compose setup — signs all authentication tokens with this publicly known value. An unauthenticated attacker can forge arbitrary admin-scoped JWTs and gain full control of the application and every security tool it manages without any credentials. This vulnerability is fixed in 0.1.57. | ||||
Page 1 of 1.