Donetick an open-source app for managing tasks and chores. Prior to version 0.1.44, the application uses JSON Web Tokens (JWT) for authentication, but the signing secret has a weak default value. While the responsibility is left to the system administrator to change it, this approach is inadequate. The vulnerability is proven by existence of the issue in the live version as well. This issue can result in full account takeover of any user. Version 0.1.44 contains a patch.
Metrics
Affected Vendors & Products
References
History
Mon, 19 May 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 17 May 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Donetick an open-source app for managing tasks and chores. Prior to version 0.1.44, the application uses JSON Web Tokens (JWT) for authentication, but the signing secret has a weak default value. While the responsibility is left to the system administrator to change it, this approach is inadequate. The vulnerability is proven by existence of the issue in the live version as well. This issue can result in full account takeover of any user. Version 0.1.44 contains a patch. | |
Title | Donetick Has Weak Default JWT Secret | |
Weaknesses | CWE-1188 CWE-453 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-17T18:36:11.790Z
Updated: 2025-05-19T14:44:38.705Z
Reserved: 2025-05-14T10:32:43.530Z
Link: CVE-2025-47945

Updated: 2025-05-19T14:44:25.291Z

Status : Awaiting Analysis
Published: 2025-05-17T19:15:46.523
Modified: 2025-05-19T15:15:25.300
Link: CVE-2025-47945

No data.