CVE-2026-42869
Last updated May 11, 2026 · Published May 11, 2026
Description
SOCFortress CoPilot focuses on providing a single pane of glass for all your security operations needs. Prior to 0.1.57, SOCFortress CoPilot ships a hardcoded JWT signing secret as a fallback value in backend/app/auth/utils.py:28 and ships it verbatim in .env.example. Any deployment where JWT_SECRET is not explicitly set — including the default Docker Compose setup — signs all authentication tokens with this publicly known value. An unauthenticated attacker can forge arbitrary admin-scoped JWTs and gain full control of the application and every security tool it manages without any credentials. This vulnerability is fixed in 0.1.57.
Affected products
1 listed- socfortress:CoPilot
Mappings
CWE
CAPEC
None listed.
Related
Research
- AuthenticationA threat-focused guide to authentication, covering attack paths, design pitfalls, and concrete defenses from…
- Password StorageExplains why passwords must be hashed with salts and slow KDFs to resist offline cracking. Covers algorithm…
- JSON Web Tokens (JWT)Explains JWT structure, threat models, and common validation pitfalls. Includes secure usage practices for…
Guides
CVE® content © MITRE Corporation. Licensed under the CVE Terms of Use. Terms
