A weakness has been identified in joey-zhou xiaozhi-esp32-server-java up to 3.0.0. This impacts the function tryAuthenticateWithCookies of the file AuthenticationInterceptor.java of the component Cookie Handler. Executing manipulation can lead to improper authentication. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. Upgrading to version 4.0.0 will fix this issue. It is recommended to upgrade the affected component.
https://vuldb.com/?submit.713990
https://vuldb.com/?ctiid.338513
https://github.com/joey-zhou/xiaozhi-esp32-server-java/releases/tag/v4.0.0
https://github.com/joey-zhou/xiaozhi-esp32-server-java/issues/143#issuecomment-3666534810
https://github.com/joey-zhou/xiaozhi-esp32-server-java/issues/143#issue-3722315701
https://github.com/joey-zhou/xiaozhi-esp32-server-java/issues/143
Published: 2025-12-28
Updated: 2025-12-29
Base Score: 6.5
Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P
Severity: Medium
Base Score: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Severity: Medium
Base Score: 5.3
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Severity: Medium
EPSS: 0.00073