Report: CVE-2026-42869 - SOCFortress CoPilot: Hardcoded JWT secret allows unauthenticated full admin comp

Report: CVE-2026-42869 - SOCFortress CoPilot: Hardcoded JWT secret allows unauthenticated full admin comp

CVE ID :CVE-2026-42869 Published : May 11, 2026, 8:25 p.m. | 36 minutes ago Description :SOCFortress CoPilot focuses on providing a single pane of glass for all your security operations needs. Prior to 0.1.57, SOCFortress CoPilot ships a hardcoded JWT signing secret as a fallback value in backend/app/auth/utils.py:28 and ships it verbatim in .env.example. Any deployment where JWT_SECRET is not explicitly set — including the default Docker Compose setup — signs all authentication tokens with this publicly known value. An unauthenticated attacker can forge arbitrary admin-scoped JWTs and gain full control of the application and every security tool it manages without any credentials. This vulnerability is fixed in 0.1.57. Severity: 10.0 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
CRITICAL
Published
May 11, 2026
Affected Product: Docker