CVE-2023-22746
NixOS vulnerability analysis and mitigation

Overview

CKAN (Comprehensive Knowledge Archive Network) is an open-source data management system that was found to have a security vulnerability identified as CVE-2023-22746. The vulnerability was discovered when Docker images were using the same default secret key across different CKAN instances, potentially allowing attackers to forge authentication requests. This issue was disclosed on February 3, 2023, and affected multiple Docker image distributions including ckan/ckan-docker, okfn/docker-ckan, and keitaroinc/docker-ckan. The vulnerability received a CVSS v3.1 score of 7.5, indicating HIGH severity (NVD).

Technical details

The vulnerability stemmed from the use of a shared default secret key across different CKAN instances when creating new containers based on affected Docker images. If users didn't set a custom value via environment variables in the .env file, the shared key made it possible for attackers to forge authentication requests. The affected Docker images included ckan/ckan-base images from ckan/ckan-docker, openknowledge/ckan-base and openknowledge/ckan-dev images from okfn/docker-ckan, and keitaro/ckan images from keitaroinc/docker-ckan. Notably, the legacy images (ckan/ckan) in the main CKAN repository were not affected by this issue (GitHub Advisory).

Impact

The vulnerability could allow attackers to forge authentication requests across different CKAN instances that were using the default secret key. This could potentially lead to unauthorized access to CKAN installations and compromise of user sessions. The severity of the impact is reflected in the HIGH CVSS score of 7.5, indicating significant potential for security breaches in affected systems (NVD).

Mitigation and workarounds

The vulnerability was patched in all affected Docker images to generate fresh keys each time a container is created. Users should pull the latest version of the relevant image to implement the fix. However, implementing the patch will invalidate all existing sessions (forcing users to log in again) and existing API tokens. It is recommended to persist the session secret key using appropriate methods such as environment variables or mounted ini files. Users who had already overridden the default secret key in their .env file were not affected by this vulnerability (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-48606HIGH7.8
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48625HIGH7
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48608MEDIUM5.5
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48569MEDIUM5.5
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-65799MEDIUM4.3
  • NixOSNixOS
  • memos
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management