Authorization Bypass in fushengqian fuint Authentication Token Handler
CVE-2025-12623
Key Information:
- Vendor
Fushengqian
- Status
- Vendor
- CVE Published:
- 3 November 2025
Badges
What is CVE-2025-12623?
A vulnerability exists in the fushengqian fuint product, specifically within the Authentication Token Handler. This issue allows attackers to manipulate the ClientSignController component, leading to a potential bypass of authorization mechanisms. The vulnerability affects systems running fuint up to the commit ID 41e26be8a2c609413a0feaa69bdad33a71ae8032, and can be exploited remotely, although executing such an attack is complex. Given that fuint follows a rolling release strategy, detailed versioning is not available, which adds a layer of challenge for system administrators in tracking updates and vulnerabilities.
Affected Version(s)
fuint 41e26be8a2c609413a0feaa69bdad33a71ae8032
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
