CVE-2025-41702

egOS · egOS WebGUI backend and potentially other related products.

A critical vulnerability has been identified in the egOS WebGUI backend, where a hardcoded JWT secret key allows unauthenticated remote attackers to bypass all security controls.

Executive summary

A critical vulnerability has been identified in the egOS WebGUI backend, where a hardcoded JWT secret key allows unauthenticated remote attackers to bypass all security controls. Successful exploitation enables an attacker to forge valid authentication tokens, granting them full administrative access to the system, which could lead to complete system compromise, data theft, and service disruption.

Vulnerability

The application contains a hardcoded (embedded) secret key used for signing JSON Web Tokens (JWTs). This key is reportedly readable by a default user, making it easily discoverable. An unauthenticated remote attacker who obtains this static key can independently generate and sign their own JWTs using the HS256 algorithm. By crafting a token with elevated privileges (e.g., administrator), the attacker can submit it to the application, which will validate it as authentic, thereby bypassing authentication and authorization mechanisms and gaining complete control over the WebGUI.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation by a remote, unauthenticated attacker can lead to a full compromise of the affected application and potentially the underlying system. The business impact includes a complete loss of confidentiality, integrity, and availability. An attacker could exfiltrate sensitive data, manipulate system configurations, delete critical information, or use the compromised system as a foothold to launch further attacks against the internal network.

Remediation

Immediate Action: Immediately update all instances of the affected products to the latest version provided by the vendor. This patch is expected to replace the hardcoded secret with a unique, securely generated key for each installation. After patching, monitor for any signs of exploitation and review historical access logs for suspicious activity.

Proactive Monitoring: Implement enhanced monitoring on affected systems. Security teams should look for unusual authentication patterns, such as a high volume of successful logins from a single IP address, or administrative actions performed outside of normal business hours. Monitor web server logs for requests containing JWTs with unusual claims or from untrusted sources.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:

  • Restrict network access to the egOS WebGUI management interface. Use a firewall or network access control lists (ACLs) to allow connections only from trusted IP addresses or internal management networks.
  • Place the application behind a Web Application Firewall (WAF) and create rules to scrutinize incoming JWTs, although detecting a properly signed malicious token is difficult.
  • Isolate the affected systems from other critical network segments to limit the potential impact of a compromise.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 9.8 and the ability for an unauthenticated attacker to achieve full system compromise, this vulnerability poses a severe risk to the organization. We strongly recommend that all affected systems be patched immediately, treating this as the highest priority remediation effort. Although there is no evidence of active exploitation, the simplicity of the attack means that threat actors will likely develop and use exploits quickly. Organizations should assume they are a target and apply vendor updates without delay.