Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14651: Use of Hard-coded Cryptographic Key in MartialBE one-hub

0
Medium
VulnerabilityCVE-2025-14651cvecve-2025-14651
Published: Sun Dec 14 2025 (12/14/2025, 08:32:06 UTC)
Source: CVE Database V5
Vendor/Project: MartialBE
Product: one-hub

Description

A vulnerability has been found in MartialBE one-hub up to 0.14.27. This vulnerability affects unknown code of the file docker-compose.yml. The manipulation of the argument SESSION_SECRET leads to use of hard-coded cryptographic key . The attack may be initiated remotely. The complexity of an attack is rather high. It is stated that the exploitability is difficult. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The code maintainer recommends (translated from Chinese): "The default docker-compose example file is not recommended for production use. If you intend to use it in production, please carefully check and modify every configuration and environment variable yourself!"

AI-Powered Analysis

AILast updated: 12/21/2025, 09:38:24 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14651 affects MartialBE one-hub versions up to 0.14.27 and stems from the use of a hard-coded cryptographic key within the docker-compose.yml configuration file, specifically through the SESSION_SECRET environment variable. This secret is used to secure session management or cryptographic operations, and hard-coding it means the same secret is reused across deployments, making it predictable and vulnerable to compromise. An attacker who can remotely access the service could exploit this weakness to hijack user sessions, decrypt sensitive data, or bypass authentication mechanisms relying on the SESSION_SECRET. The attack complexity is rated high, indicating that exploitation requires significant effort or specific conditions, and no privileges or user interaction are needed. The vulnerability does not affect integrity or availability directly but compromises confidentiality. The vendor explicitly states that the default docker-compose example is not intended for production use and urges administrators to customize all configurations and environment variables, including SESSION_SECRET, to unique, secure values. No patches or fixes are currently linked, and no known exploits are reported in the wild, but public disclosure means attackers could develop exploits. The CVSS 4.0 score is 6.3 (medium), reflecting network attack vector, high complexity, no privileges, no user interaction, and limited confidentiality impact. This vulnerability highlights the risks of deploying default configurations in containerized environments without proper security hardening.

Potential Impact

For European organizations, the primary impact of CVE-2025-14651 lies in the potential compromise of session confidentiality and cryptographic protections within MartialBE one-hub deployments. Organizations using this product with default or unchanged SESSION_SECRET values risk session hijacking, unauthorized access, or data exposure. This is particularly critical for sectors handling sensitive personal data, such as finance, healthcare, or government services, where session integrity is vital. The medium severity and high attack complexity reduce the likelihood of widespread exploitation but do not eliminate risk, especially from targeted attackers with resources to analyze and exploit the vulnerability. The use of container orchestration and microservices in European enterprises means that this vulnerability could serve as an entry point for lateral movement if not mitigated. Additionally, compliance with GDPR and other data protection regulations could be jeopardized if session secrets are compromised, leading to potential legal and reputational consequences. Organizations relying on MartialBE one-hub for collaboration or data management should prioritize remediation to maintain confidentiality and trust.

Mitigation Recommendations

To mitigate CVE-2025-14651, European organizations should immediately audit all MartialBE one-hub deployments to identify usage of the default docker-compose.yml configuration and the SESSION_SECRET environment variable. Replace any hard-coded or default SESSION_SECRET values with strong, randomly generated secrets unique to each deployment. Implement automated configuration management and secrets management tools to enforce secure environment variable handling. Avoid deploying default example configurations in production environments. Additionally, restrict network access to the one-hub service using firewalls or zero-trust network principles to reduce exposure. Monitor logs for unusual session activity that could indicate exploitation attempts. Stay updated with MartialBE vendor advisories for patches or updated configuration guidelines. Consider container security best practices such as image scanning and runtime protection to detect anomalous behavior. Finally, integrate these controls into the organization's broader security policy and incident response plans to ensure rapid detection and remediation of potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T09:14:28.307Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693e78bf6ded7774d2ea03fc

Added to database: 12/14/2025, 8:43:43 AM

Last enriched: 12/21/2025, 9:38:24 AM

Last updated: 2/2/2026, 11:51:23 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats