The equipment grants a JWT token for each connection in...
High severity
Unreviewed
Published
Oct 31, 2025
to the GitHub Advisory Database
•
Updated Oct 31, 2025
Description
Published by the National Vulnerability Database
Oct 31, 2025
Published to the GitHub Advisory Database
Oct 31, 2025
Last updated
Oct 31, 2025
The
equipment grants a JWT token for each connection in the timeline, but during an
active valid session, a hijacking of the token can be done. This will allow an
attacker with the token modify parameters of security, access or even steal the
session without
the legitimate and active session detecting it. The web server allows the
attacker to reuse an old session JWT token while the legitimate session is
active.
References