{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T18:38:33.350","vulnerabilities":[{"cve":{"id":"CVE-2025-30206","sourceIdentifier":"security-advisories@github.com","published":"2025-04-15T20:15:39.127","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Dpanel is a Docker visualization panel system which provides complete Docker management functions. The Dpanel service contains a hardcoded JWT secret in its default configuration, allowing attackers to generate valid JWT tokens and compromise the host machine. This security flaw allows attackers to analyze the source code, discover the embedded secret, and craft legitimate JWT tokens. By forging these tokens, an attacker can successfully bypass authentication mechanisms, impersonate privileged users, and gain unauthorized administrative access. Consequently, this enables full control over the host machine, potentially leading to severe consequences such as sensitive data exposure, unauthorized command execution, privilege escalation, or further lateral movement within the network environment. This issue is patched in version 1.6.1. A workaround for this vulnerability involves replacing the hardcoded secret with a securely generated value and load it from secure configuration storage."},{"lang":"es","value":"Dpanel es un sistema de panel de visualización de Docker que proporciona funciones completas de gestión de Docker. El servicio Dpanel contiene un secreto JWT codificado en su configuración predeterminada, lo que permite a los atacantes generar tokens JWT válidos y comprometer el equipo host. Esta falla de seguridad permite a los atacantes analizar el código fuente, descubrir el secreto incrustado y crear tokens JWT legítimos. Al falsificar estos tokens, un atacante puede eludir los mecanismos de autenticación, suplantar a usuarios con privilegios y obtener acceso administrativo no autorizado. En consecuencia, esto permite el control total del equipo host, lo que puede conllevar graves consecuencias, como la exposición de datos confidenciales, la ejecución no autorizada de comandos, la escalada de privilegios o un mayor movimiento lateral dentro del entorno de red. Este problema está corregido en la versión 1.6.1. Un workaround para esta vulnerabilidad consiste en reemplazar el secreto codificado con un valor generado de forma segura y cargarlo desde un almacenamiento de configuración seguro."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-321"},{"lang":"en","value":"CWE-453"},{"lang":"en","value":"CWE-547"}]}],"references":[{"url":"https://github.com/donknap/dpanel/security/advisories/GHSA-j752-cjcj-w847","source":"security-advisories@github.com"}]}}]}