CVE-2025-14261

Litmus · Litmus Multiple Products

A high-severity vulnerability has been identified in multiple Litmus products, stemming from the use of an extremely weak secret key for signing JSON Web Tokens (JWTs).

Executive summary

A high-severity vulnerability has been identified in multiple Litmus products, stemming from the use of an extremely weak secret key for signing JSON Web Tokens (JWTs). This weakness allows an attacker to easily crack the secret, forge authentication tokens, and gain unauthorized access to the platform, potentially with administrative privileges. Successful exploitation could lead to a complete compromise of the application, data theft, and unauthorized system modifications.

Vulnerability

The Litmus platform utilizes JSON Web Tokens (JWTs) for managing user authentication and authorization sessions. The security of these tokens relies on a cryptographic signature generated using a secret key known only to the server. This vulnerability exists because the secret key used for signing is derived from a core secret of only 6 bytes (48 bits). This key length is insufficient to withstand a modern brute-force attack. An attacker can capture a valid JWT, and then perform an offline cracking attack to recover the 6-byte secret in a very short amount of time. Once the secret is compromised, the attacker can forge arbitrary JWTs, impersonating any user, including administrators, and sign them with the cracked secret to gain privileged access to the application.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.1. The primary business impact is the high risk of a complete system compromise. An attacker who successfully exploits this vulnerability could impersonate any user, including high-privilege administrators, leading to unauthorized access to sensitive customer data, intellectual property, and internal systems. Potential consequences include significant data breaches, financial loss, reputational damage, and loss of customer trust. The ease of exploitation elevates the risk, as it does not require sophisticated techniques, making the organization a target for a wide range of threat actors.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected Litmus products without delay. After patching, it is crucial to review access logs for any signs of unauthorized or suspicious activity that may have occurred prior to the update. All active user sessions should be invalidated to ensure any potentially forged JWTs are no longer valid.

Proactive Monitoring: Implement enhanced logging and monitoring focused on authentication events. Security teams should look for unusual patterns, such as a high volume of authentication attempts from a single IP address, successful logins from geographically anomalous locations, or privileged account activity (e.g., user creation, permission changes) occurring outside of normal business hours. Monitor for any JWTs with unusual claims or structures.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk. Enforce strict IP address whitelisting for access to the platform, especially for administrative interfaces. Deploy a Web Application Firewall (WAF) with rules to detect and block anomalous JWTs or requests indicative of brute-force attempts. Enforcing Multi-Factor Authentication (MFA) can provide an additional layer of security, as an attacker with a forged JWT may still be challenged for a second factor.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the high severity (CVSS 7.1) and the public availability of exploit tools, this vulnerability poses a critical and immediate risk to the organization. We strongly recommend that all affected Litmus products be patched immediately, treating this as a top-priority action. Until patching is complete, the compensating controls outlined above should be implemented to mitigate the risk of compromise. The security team should assume that exploitation attempts are imminent, if not already occurring, and actively hunt for indicators of compromise within authentication logs and system activity.