CVE-2025-70841
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Lifecycle Timeline
3Description
Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to obtain sensitive application configuration data via direct request to /script/.env file. The exposed file contains Laravel application encryption key (APP_KEY), database credentials, SMTP/SendGrid API credentials, and internal configuration parameters, enabling complete system compromise including authentication bypass via session token forgery, direct database access to all tenant data, and email infrastructure takeover. Due to the multi-tenancy architecture, this vulnerability affects all tenants in the system.
Analysis
Dokans SaaS e-commerce platform v3.9.2 has a CVSS 10.0 authentication bypass allowing unauthenticated attackers to obtain sensitive application secrets and tenant data.
Technical Context
Dokans Multi-Tenancy Based eCommerce Platform SaaS v3.9.2 has a CWE-287 authentication bypass that allows unauthenticated remote attackers to access sensitive application secrets, API keys, and tenant-specific data.
Affected Products
['Dokans SaaS e-commerce platform v3.9.2']
Remediation
Update immediately. Rotate all API keys and payment credentials. Notify affected tenants.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today