CVE-2022-25510: Hard coded credentials in FreeTAKServer
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.50571%
CWE
Published
3/12/2022
Updated
11/26/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
FreeTAKServer | pip | <= 1.9.8 | 1.9.8.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from hardcoded Flask secret keys identified in the GitHub issue (#292). While exact code isn't shown, Flask applications typically configure the secret key during app initialization (create_app pattern) or via configuration classes. The high confidence comes from: 1) CWE-798 explicitly calling out hardcoded credentials, 2) GHSA confirmation of static secret key, and 3) standard Flask security practices requiring dynamic secret management. The functions responsible for setting app.secret_key with a static value are the root cause.