CVE-2025-47945 – Donetick Weak Default JWT Signing Secret in Donetick Task Management App

The following table lists the changes that have been made to the
CVE-2025-47945 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    May. 17, 2025

    Action Type Old Value New Value
    Added Description Donetick an open-source app for managing tasks and chores. Prior to version 0.1.44, the application uses JSON Web Tokens (JWT) for authentication, but the signing secret has a weak default value. While the responsibility is left to the system administrator to change it, this approach is inadequate. The vulnerability is proven by existence of the issue in the live version as well. This issue can result in full account takeover of any user. Version 0.1.44 contains a patch.
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
    Added CWE CWE-1188
    Added CWE CWE-453
    Added Reference https://github.com/donetick/donetick/commit/620b897bc0135f6668bb8a5562678104531108eb
    Added Reference https://github.com/donetick/donetick/commit/b9a6e177eefdc605dedbc5320f0d93d6573d1db6
    Added Reference https://github.com/donetick/donetick/security/advisories/GHSA-hjjg-vw4j-986x
Share the Post:

Related Posts