CVE-2025-7453
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-11

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in saltbo zpan up to 1.6.5/1.7.0-beta2. It has been rated as problematic. This issue affects the function NewToken of the file zpan/internal/app/service/token.go of the component JSON Web Token Handler. The manipulation with the input 123 leads to use of hard-coded password. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-11
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-07-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
saltbo zpan 1.6.5
saltbo zpan 1.7.0-beta2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-259 The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.
CWE-255
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the JSON Web Token Handler component of saltbo zpan up to versions 1.6.5 and 1.7.0-beta2. Specifically, it affects the NewToken function in the file zpan/internal/app/service/token.go. The issue arises because the input '123' leads to the use of a hard-coded password, which can be exploited remotely. The attack complexity is high and exploitation is difficult, but the exploit has been publicly disclosed.


How can this vulnerability impact me? :

The vulnerability could allow an attacker to remotely exploit the system by leveraging the hard-coded password in the token generation process. This could potentially lead to unauthorized access or manipulation of authentication tokens, compromising the security of the affected application. However, the attack complexity is high and exploitation is difficult.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart