CVE-2025-6669

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-6669
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-6669.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-6669
Published
2025-06-25T23:15:21Z
Modified
2025-06-27T12:52:46.495783Z
Summary
[none]
Details

A vulnerability was found in gooaclok819 sublinkX up to 1.8. It has been declared as problematic. This vulnerability affects unknown code of the file middlewares/jwt.go. The manipulation with the input sublink leads to use of hard-coded cryptographic key . The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9 is able to address this issue. The patch is identified as 778d26aef723daa58df98c8060c43f5bf5d1b10b. It is recommended to upgrade the affected component.

References

Affected packages

Git / github.com/gooaclok819/sublinkx

Affected ranges

Type
GIT
Repo
https://github.com/gooaclok819/sublinkx
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.0
1.1
1.2
1.3
1.4
1.5
1.5.1
1.6
1.6.1
1.7
1.7.1
1.7.2
1.7.3
1.8