Vulnerability Description
Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to obtain sensitive application configuration data via direct request to /script/.env file. The exposed file contains Laravel application encryption key (APP_KEY), database credentials, SMTP/SendGrid API credentials, and internal configuration parameters, enabling complete system compromise including authentication bypass via session token forgery, direct database access to all tenant data, and email infrastructure takeover. Due to the multi-tenancy architecture, this vulnerability affects all tenants in the system.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Amcoders | Dokans | 3.9.2 |
Related Weaknesses (CWE)
References
- https://codecanyon.net/item/dokans-multitenancy-based-ecommerce-platform-saas/31Product
- https://github.com/cod3rLucas/security-advisories/blob/main/CVE-2025-70841.mdExploitThird Party AdvisoryMitigation
FAQ
What is CVE-2025-70841?
CVE-2025-70841 is a vulnerability with a CVSS score of 10.0 (CRITICAL). Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to obtain sensitive application configuration data via direct request to /script/.env file. The exposed...
How severe is CVE-2025-70841?
CVE-2025-70841 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-70841?
Check the references section above for vendor advisories and patch information. Affected products include: Amcoders Dokans.