Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14651: Use of Hard-coded Cryptographic Key in MartialBE one-hub

0
Medium
VulnerabilityCVE-2025-14651cvecve-2025-14651
Published: Sun Dec 14 2025 (12/14/2025, 08:32:06 UTC)
Source: CVE Database V5
Vendor/Project: MartialBE
Product: one-hub

Description

A vulnerability has been found in MartialBE one-hub up to 0.14.27. This vulnerability affects unknown code of the file docker-compose.yml. The manipulation of the argument SESSION_SECRET leads to use of hard-coded cryptographic key . The attack may be initiated remotely. The complexity of an attack is rather high. It is stated that the exploitability is difficult. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The code maintainer recommends (translated from Chinese): "The default docker-compose example file is not recommended for production use. If you intend to use it in production, please carefully check and modify every configuration and environment variable yourself!"

AI-Powered Analysis

AILast updated: 12/14/2025, 08:58:25 UTC

Technical Analysis

CVE-2025-14651 identifies a vulnerability in MartialBE one-hub, a software product used for collaborative or hub services, affecting all versions up to 0.14.27. The vulnerability is due to the use of a hard-coded cryptographic key specified in the docker-compose.yml file, particularly the SESSION_SECRET environment variable. This secret is intended to secure session management or cryptographic operations but is fixed and publicly known in the default configuration, making it predictable. Attackers can remotely exploit this flaw by leveraging the known SESSION_SECRET to potentially decrypt or forge session tokens, leading to unauthorized access or data exposure. The attack complexity is high, indicating that exploitation requires significant effort or conditions, and no privileges or user interaction are needed. The vulnerability does not affect integrity or availability directly but impacts confidentiality by exposing cryptographic secrets. The vendor explicitly states that the default docker-compose example is not suitable for production and recommends users to customize all configurations and environment variables. No patches or fixes are currently linked, so mitigation relies on configuration changes. No known exploits are reported in the wild, but public disclosure increases risk. The CVSS 4.0 score is 6.3 (medium), reflecting network attack vector, high complexity, no privileges or user interaction, and limited confidentiality impact. This vulnerability highlights the risks of deploying default configurations with embedded secrets in containerized environments.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized access to sensitive session data or cryptographic operations if MartialBE one-hub is deployed using default configurations. Confidentiality breaches could lead to exposure of user data or internal communications, undermining trust and compliance with GDPR and other data protection regulations. Although the attack complexity is high, skilled attackers targeting organizations with valuable data or critical infrastructure could exploit this vulnerability remotely without authentication. This could facilitate lateral movement or privilege escalation in broader attack campaigns. The impact is particularly significant for sectors relying on secure collaboration platforms, such as finance, healthcare, and government agencies. Additionally, the use of container orchestration and default environment variables is common in DevOps pipelines, increasing the likelihood of misconfiguration. Failure to address this vulnerability could result in regulatory penalties, reputational damage, and operational disruptions.

Mitigation Recommendations

European organizations should immediately audit all MartialBE one-hub deployments to identify usage of default docker-compose.yml files and the SESSION_SECRET environment variable. Replace the hard-coded SESSION_SECRET with a securely generated, high-entropy secret unique to each deployment. Implement secrets management best practices, such as using vault solutions or environment-specific secret injection mechanisms rather than embedding secrets in code or configuration files. Review and harden all environment variables and configuration settings before production deployment. Monitor network traffic for anomalous access patterns targeting the one-hub service. Apply network segmentation and firewall rules to restrict access to the one-hub service to trusted internal networks. Engage with MartialBE for updates or patches addressing this issue and subscribe to vendor advisories. Conduct regular security training for DevOps and infrastructure teams to prevent deployment of insecure default configurations. Finally, integrate configuration scanning tools into CI/CD pipelines to detect hard-coded secrets automatically.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T09:14:28.307Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693e78bf6ded7774d2ea03fc

Added to database: 12/14/2025, 8:43:43 AM

Last enriched: 12/14/2025, 8:58:25 AM

Last updated: 12/14/2025, 3:07:07 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats