Cyber Posture

CVE-2025-56749

CriticalPublic PoC

Published: 15 October 2025

Published
15 October 2025
Modified
21 October 2025
KEV Added
Patch
CVSS Score 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
EPSS Score 0.0013 32.0th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may forge credential materials that can be used to gain access to web applications or Internet services.

Security Summary

CVE-2025-56749, published on 2025-10-15, affects Creativeitem Academy LMS versions up to and including 6.14. The vulnerability involves the use of a hardcoded default JWT secret for token signing, which is predictable and enables attackers to forge valid JWT tokens. This flaw, mapped to CWE-798 (Use of Hard-coded Credentials), carries a CVSS v3.1 base score of 9.4 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L), highlighting its critical impact on confidentiality, integrity, and limited availability.

Remote, unauthenticated attackers can exploit this vulnerability over the network with low attack complexity and no user interaction. By leveraging the known JWT secret, they can craft arbitrary tokens to bypass authentication, resulting in unauthorized access to any user account within the LMS.

Advisories and mitigation details are provided in the referenced source at https://suryadina.com/academy-lms-jwt-secret-7k9m2x4p8q/, which security practitioners should review for patching recommendations and remediation steps.

Details

CWE(s)
CWE-798

Affected Products

creativeitem
academy lms
≤ 6.14

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1606 Forge Web Credentials Credential Access
Adversaries may forge credential materials that can be used to gain access to web applications or Internet services.
Why these techniques?

Hardcoded predictable JWT secret enables remote unauthenticated attackers to forge authentication tokens, directly facilitating exploitation of a public-facing web application (T1190) and forging web credentials such as tokens (T1606).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References