A path traversal vulnerability in FastX3 thru 3.3.67...
High severity
Unreviewed
Published
Oct 14, 2025
to the GitHub Advisory Database
•
Updated Oct 14, 2025
Description
Published by the National Vulnerability Database
Oct 14, 2025
Published to the GitHub Advisory Database
Oct 14, 2025
Last updated
Oct 14, 2025
A path traversal vulnerability in FastX3 thru 3.3.67 allows an unauthenticated attacker to read arbitrary files on the server. By leveraging this vulnerability, it is possible to access the application's configuration files, which contain the secret key used to sign JSON Web Tokens as well as existing JTIs. With this information, an attacker can forge valid JWTs, impersonate the root user, and achieve remote code execution in privileged context via authenticated endpoints.
References