GHSA-c8m8-3jcr-6rj5

Suggest an improvement
Source
https://github.com/advisories/GHSA-c8m8-3jcr-6rj5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-c8m8-3jcr-6rj5/GHSA-c8m8-3jcr-6rj5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-c8m8-3jcr-6rj5
Published
2026-03-07T02:31:18Z
Modified
2026-03-07T02:48:13.381734Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
FUXA has a hardcoded fallback JWT signing secret
Details

FUXA used a static fallback JWT signing secret (frangoteam751) when no secretCode was configured.

If authentication was enabled without explicitly setting a custom secret, an attacker who knew the default value could forge valid JWT tokens and bypass authentication.

This issue has been addressed in version 1.3.0 by removing the static fallback and generating a secure random secret when no secretCode is provided.

Database specific
{
    "cwe_ids": [
        "CWE-321"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "nvd_published_at": null,
    "github_reviewed_at": "2026-03-07T02:31:18Z"
}
References

Affected packages

npm / @frangoteam/fuxa

Package

Name
@frangoteam/fuxa
View open source insights on deps.dev
Purl
pkg:npm/%40frangoteam/fuxa

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-c8m8-3jcr-6rj5/GHSA-c8m8-3jcr-6rj5.json"
last_known_affected_version_range
"<= 1.2.11"