CVE-2025-47945: Donetick Has Weak Default JWT Secret

9.1 CVSS

Description

Donetick an open-source app for managing tasks and chores. Prior to version 0.1.44, the application uses JSON Web Tokens (JWT) for authentication, but the signing secret has a weak default value. While the responsibility is left to the system administrator to change it, this approach is inadequate. The vulnerability is proven by existence of the issue in the live version as well. This issue can result in full account takeover of any user. Version 0.1.44 contains a patch.

Classification

CVE ID: CVE-2025-47945

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.1

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem Types

CWE-453: Insecure Default Variable Initialization CWE-1188: Insecure Default Initialization of Resource

Affected Products

Vendor: donetick

Product: donetick

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.06% (probability of being exploited)

EPSS Percentile: 17.16% (scored less or equal to compared to others)

EPSS Date: 2025-06-06 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-47945
https://github.com/donetick/donetick/security/advisories/GHSA-hjjg-vw4j-986x
https://github.com/donetick/donetick/commit/620b897bc0135f6668bb8a5562678104531108eb
https://github.com/donetick/donetick/commit/b9a6e177eefdc605dedbc5320f0d93d6573d1db6

Timeline