{"id":"CVE-2023-31579","details":"Dromara Lamp-Cloud before v3.8.1 was discovered to use a hardcoded cryptographic key when creating and verifying a Json Web Token. This vulnerability allows attackers to authenticate to the application via a crafted JWT token.","aliases":["GHSA-xr8c-mq5x-5f56"],"modified":"2026-04-12T06:37:10.997568Z","published":"2023-11-02T22:15:08.640Z","references":[{"type":"ADVISORY","url":"https://github.com/xubowenW/JWTissues/blob/main/lamp%20issue.md"},{"type":"FIX","url":"https://github.com/dromara/lamp-cloud/issues/183"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dromara/lamp-cloud","events":[{"introduced":"0"},{"fixed":"581b3f8eb12635bc654d1d364647a4581bd23af0"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"3.8.1"}],"cpe":"cpe:2.3:a:tangyh:lamp-cloud:*:*:*:*:*:*:*:*"}}],"versions":["2.5.2","2.6.0","2.7.0","3.0.0","3.0.1","3.0.2","3.1.0","3.1.2","3.2.0","3.2.1","3.2.2","3.2.4","3.3.0","3.4.0","3.5.0","3.5.1","3.5.2","3.5.3","3.5.4","3.5.5","3.5.7","3.5.8","3.6.0","3.6.2","3.7.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-31579.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}