CVE-2026-6580
Hard-Coded Cryptographic Key in DjangoBlog Amap API Handler
Publication date: 2026-04-19
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| liangliangyy | django_blog | to 2.1.0.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-320 | Key Management Errors |
| CWE-321 | The product uses a hard-coded, unchangeable cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the liangliangyy DjangoBlog software up to version 2.1.0.0, specifically in the Amap API Call Handler component within the file owntracks/views.py. It involves manipulation of an argument named 'key' which causes the software to use a hard-coded cryptographic key. This flaw can be exploited remotely.
How can this vulnerability impact me? :
The use of a hard-coded cryptographic key due to this vulnerability can lead to compromised security, as attackers may exploit this to bypass authentication or decrypt sensitive data. Since the attack can be launched remotely, it increases the risk of unauthorized access or data manipulation.