CVE-2025-51606 – cn.hippo4j:hippo4j-core
Package
Manager: maven
Name: cn.hippo4j:hippo4j-core
Vulnerable Version: >=1.0.0 <=1.5.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00051 pctl0.15411
Details
hippo4j Includes Hard Coded Secret Key in JWT Creation hippo4j 1.0.0 to 1.5.0, uses a hard-coded secret key in its JWT (JSON Web Token) creation. This allows attackers with access to the source code or compiled binary to forge valid access tokens and impersonate any user, including privileged ones such as "admin". The vulnerability poses a critical security risk in systems where authentication and authorization rely on the integrity of JWTs.
Metadata
Created: 2025-08-21T21:32:08Z
Modified: 2025-08-22T20:30:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-48cg-9c55-j2q7/GHSA-48cg-9c55-j2q7.json
CWE IDs: ["CWE-798"]
Alternative ID: GHSA-48cg-9c55-j2q7
Finding: F009
Auto approve: 1