SOCFortress CoPilot focuses on providing a single pane of glass for all your security operations needs. Prior to 0.1.57, SOCFortress CoPilot ships a hardcoded JWT signing secret as a fallback value in backend/app/auth/utils.py:28 and ships it verbatim in .env.example. Any deployment where JWT_SECRET is not explicitly set — including the default Docker Compose setup — signs all authentication tokens with this publicly known value. An unauthenticated attacker can forge arbitrary admin-scoped JWTs and gain full control of the application and every security tool it manages without any credentials. This vulnerability is fixed in 0.1.57.
Metrics
Affected Vendors & Products
References
History
Mon, 11 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SOCFortress CoPilot focuses on providing a single pane of glass for all your security operations needs. Prior to 0.1.57, SOCFortress CoPilot ships a hardcoded JWT signing secret as a fallback value in backend/app/auth/utils.py:28 and ships it verbatim in .env.example. Any deployment where JWT_SECRET is not explicitly set — including the default Docker Compose setup — signs all authentication tokens with this publicly known value. An unauthenticated attacker can forge arbitrary admin-scoped JWTs and gain full control of the application and every security tool it manages without any credentials. This vulnerability is fixed in 0.1.57. | |
| Title | SOCFortress CoPilot: Hardcoded JWT secret allows unauthenticated full admin compromise and lateral movement into all integrated SOC tools | |
| Weaknesses | CWE-287 CWE-522 CWE-798 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T18:39:28.664Z
Reserved: 2026-04-30T18:49:06.710Z
Link: CVE-2026-42869
No data.
Status : Received
Published: 2026-05-11T20:25:43.347
Modified: 2026-05-11T20:25:43.347
Link: CVE-2026-42869
No data.
OpenCVE Enrichment
Updated: 2026-05-11T21:00:14Z