CVE-2025-21617 – guzzlehttp/oauth-subscriber
Package
Manager: composer
Name: guzzlehttp/oauth-subscriber
Vulnerable Version: >=0 <0.8.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00118 pctl0.31407
Details
Guzzle OAuth Subscriber has insufficient nonce entropy ### Impact Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source (https://github.com/guzzle/oauth-subscriber/blob/0.8.0/src/Oauth1.php#L192). This can leave servers vulnerable to replay attacks when TLS is not used. ### Patches Upgrade to version 0.8.1 or higher. ### Workarounds No. ### References Issue is similar to https://nvd.nist.gov/vuln/detail/CVE-2025-22376.
Metadata
Created: 2025-01-06T19:23:26Z
Modified: 2025-01-06T22:15:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/01/GHSA-237r-r8m4-4q88/GHSA-237r-r8m4-4q88.json
CWE IDs: ["CWE-338"]
Alternative ID: GHSA-237r-r8m4-4q88
Finding: F034
Auto approve: 1