AstrBot is vulnerable to RCE with hard-coded JWT signing keys
Critical severity
GitHub Reviewed
Published
Nov 14, 2025
in
AstrBotDevs/AstrBot
•
Updated May 12, 2026
Description
Published to the GitHub Advisory Database
Nov 14, 2025
Reviewed
Nov 14, 2025
Published by the National Vulnerability Database
May 8, 2026
Last updated
May 12, 2026
Summary
AstrBot uses a hard-coded JWT signing key, allowing attackers to execute arbitrary commands by installing a malicious plugin.
Details
AstrBot uses a hard-coded JWT signing key, which allows attackers to bypass the authentication mechanism. Once bypassed, the attacker can install a Python plugin that will be imported here, enabling arbitrary command execution on the target host.
Impact
All publicly accessible AstrBot instances are vulnerable.
For more information, please see: CVE-2025-55449-AstrBot-RCE
Patch
This vulnerability was first reported on 2025-06-21 and was patched on the same day (2025-06-21).
The vulnerability was publicly disclosed on 2025-11-14. Prior to public disclosure, monitoring from AstrBot Cloud indicated that fewer than 2% of deployed instances were still running the affected version. Therefore, this disclosure is not expected to have a significant impact on existing active instances.
References