Skip to main content

Use of Hard-coded Credentials


Severity High
Score 9.8/10


MCMS 5.2.5 prior to 5.2.9 was discovered to have a hardcoded shiro-key, allowing attackers to exploit the key and execute arbitrary code.

  • LOW
  • HIGH
  • NONE
  • NONE
  • HIGH
  • HIGH

CWE-798 - Use of Hard-coded Credentials

The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.

Advisory Timeline

  • Published