Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70841: n/a

0
Critical
VulnerabilityCVE-2025-70841cvecve-2025-70841
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to obtain sensitive application configuration data via direct request to /script/.env file. The exposed file contains Laravel application encryption key (APP_KEY), database credentials, SMTP/SendGrid API credentials, and internal configuration parameters, enabling complete system compromise including authentication bypass via session token forgery, direct database access to all tenant data, and email infrastructure takeover. Due to the multi-tenancy architecture, this vulnerability affects all tenants in the system.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:15:49 UTC

Technical Analysis

CVE-2025-70841 is a critical security vulnerability affecting Dokans Multi-Tenancy Based eCommerce Platform SaaS version 3.9.2. The flaw arises from improper access controls allowing unauthenticated remote attackers to directly request and retrieve the .env file located at /script/.env. This file contains highly sensitive configuration data including the Laravel application encryption key (APP_KEY), database credentials, and SMTP/SendGrid API credentials. The exposure of the APP_KEY enables attackers to forge session tokens, effectively bypassing authentication mechanisms. Access to database credentials allows direct database access, compromising all tenant data due to the platform's multi-tenancy architecture. Additionally, SMTP and SendGrid API credentials exposure permits attackers to hijack the email infrastructure, potentially facilitating phishing or further attacks. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS 3.1 base score is 10.0, reflecting the critical impact on confidentiality, integrity, and availability, as well as the ease of exploitation. Although no known exploits are currently reported in the wild, the vulnerability represents a severe risk to all organizations using this platform. The multi-tenancy nature means a single exploit compromises all tenants, amplifying the threat. No official patches or mitigations are listed yet, emphasizing the need for immediate risk management and protective measures.

Potential Impact

For European organizations using Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2, this vulnerability poses a catastrophic risk. Attackers can gain full control over the platform by obtaining sensitive credentials and encryption keys, leading to complete system compromise. Confidentiality is severely impacted as attackers can access all tenant data, including potentially sensitive customer and payment information. Integrity is compromised through authentication bypass and possible data manipulation. Availability may be affected if attackers disrupt services or delete data. The takeover of email infrastructure can facilitate widespread phishing campaigns or further lateral attacks. Given the multi-tenancy architecture, a single exploited instance affects all tenants, magnifying the damage. This can lead to regulatory violations under GDPR due to data breaches, resulting in legal penalties and reputational damage. The critical nature of this vulnerability demands urgent attention from affected organizations to prevent data loss, service disruption, and financial harm.

Mitigation Recommendations

1. Immediately restrict public access to the /script/.env file and any other sensitive configuration files by configuring web server rules (e.g., .htaccess, nginx config) to deny external requests. 2. Implement strict access controls and authentication for all administrative and configuration endpoints. 3. Rotate all exposed credentials including Laravel APP_KEY, database passwords, SMTP/SendGrid API keys, and any other secrets stored in the .env file. 4. Monitor logs for any suspicious access attempts to /script/.env or unusual authentication bypass activities. 5. Deploy Web Application Firewalls (WAF) with custom rules to block unauthorized access to sensitive paths. 6. Conduct a thorough security audit of the platform’s file permissions and directory exposure to identify other potential leaks. 7. Isolate tenant data where possible to limit blast radius in multi-tenant environments. 8. Engage with the vendor or community for patches or updates addressing this vulnerability and apply them promptly once available. 9. Educate internal teams about the risks of exposing configuration files and enforce secure deployment practices. 10. Consider additional network segmentation and monitoring to detect lateral movement if compromise is suspected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982fcd6f9fa50a62f766381

Added to database: 2/4/2026, 8:01:26 AM

Last enriched: 2/4/2026, 8:15:49 AM

Last updated: 2/5/2026, 5:39:33 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats