CVE-2025-70841

CRITICAL
2026-02-03 [email protected]
10.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
PoC Detected
Feb 11, 2026 - 15:58 vuln.today
Public exploit code
CVE Published
Feb 03, 2026 - 18:16 nvd
CRITICAL 10.0

Description

Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to obtain sensitive application configuration data via direct request to /script/.env file. The exposed file contains Laravel application encryption key (APP_KEY), database credentials, SMTP/SendGrid API credentials, and internal configuration parameters, enabling complete system compromise including authentication bypass via session token forgery, direct database access to all tenant data, and email infrastructure takeover. Due to the multi-tenancy architecture, this vulnerability affects all tenants in the system.

Analysis

Dokans SaaS e-commerce platform v3.9.2 has a CVSS 10.0 authentication bypass allowing unauthenticated attackers to obtain sensitive application secrets and tenant data.

Technical Context

Dokans Multi-Tenancy Based eCommerce Platform SaaS v3.9.2 has a CWE-287 authentication bypass that allows unauthenticated remote attackers to access sensitive application secrets, API keys, and tenant-specific data.

Affected Products

['Dokans SaaS e-commerce platform v3.9.2']

Remediation

Update immediately. Rotate all API keys and payment credentials. Notify affected tenants.

Priority Score

70
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +50
POC: +20

Share

CVE-2025-70841 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy