RevelaCode is an AI-powered faith-tech project that decodes biblical verses, prophecies and global events into accessible language. In versions below 1.0.1, a valid MongoDB Atlas URI with embedded username and password was accidentally committed to the public repository. This could allow unauthorized access to production or staging databases, potentially leading to data exfiltration, modification, or deletion. This is fixed in version 1.0.1. Workarounds include: immediately rotating credentials for the exposed database user, using a secret manager (like Vault, Doppler, AWS Secrets Manager, etc.) instead of storing secrets directly in code, or auditing recent access logs for suspicious activity.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Jul 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Musombi123
Musombi123 revelacode |
|
Vendors & Products |
Musombi123
Musombi123 revelacode |
Mon, 28 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 28 Jul 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | RevelaCode is an AI-powered faith-tech project that decodes biblical verses, prophecies and global events into accessible language. In versions below 1.0.1, a valid MongoDB Atlas URI with embedded username and password was accidentally committed to the public repository. This could allow unauthorized access to production or staging databases, potentially leading to data exfiltration, modification, or deletion. This is fixed in version 1.0.1. Workarounds include: immediately rotating credentials for the exposed database user, using a secret manager (like Vault, Doppler, AWS Secrets Manager, etc.) instead of storing secrets directly in code, or auditing recent access logs for suspicious activity. | |
Title | RevelaCode exposes Sensitive MongoDB Atlas URI in .env (potential credential leak) | |
Weaknesses | CWE-522 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-28T20:28:02.575Z
Updated: 2025-07-28T20:36:02.377Z
Reserved: 2025-07-21T23:18:10.282Z
Link: CVE-2025-54428

Updated: 2025-07-28T20:35:53.807Z

Status : Awaiting Analysis
Published: 2025-07-28T21:15:27.327
Modified: 2025-07-29T14:14:29.590
Link: CVE-2025-54428

No data.