Donetick an open-source app for managing tasks and chores. Prior to version 0.1.44, the application uses JSON Web Tokens (JWT) for authentication, but the signing secret has a weak default value. While the responsibility is left to the system administrator to change it, this approach is inadequate. The vulnerability is proven by existence of the issue in the live version as well. This issue can result in full account takeover of any user. Version 0.1.44 contains a patch.
History

Mon, 19 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 17 May 2025 18:45:00 +0000

Type Values Removed Values Added
Description Donetick an open-source app for managing tasks and chores. Prior to version 0.1.44, the application uses JSON Web Tokens (JWT) for authentication, but the signing secret has a weak default value. While the responsibility is left to the system administrator to change it, this approach is inadequate. The vulnerability is proven by existence of the issue in the live version as well. This issue can result in full account takeover of any user. Version 0.1.44 contains a patch.
Title Donetick Has Weak Default JWT Secret
Weaknesses CWE-1188
CWE-453
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-05-17T18:36:11.790Z

Updated: 2025-05-19T14:44:38.705Z

Reserved: 2025-05-14T10:32:43.530Z

Link: CVE-2025-47945

cve-icon Vulnrichment

Updated: 2025-05-19T14:44:25.291Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-17T19:15:46.523

Modified: 2025-05-19T15:15:25.300

Link: CVE-2025-47945

cve-icon Redhat

No data.