logo

CVE-2025-51606 cn.hippo4j:hippo4j-core

Package

Manager: maven
Name: cn.hippo4j:hippo4j-core
Vulnerable Version: >=1.0.0 <=1.5.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00051 pctl0.15411

Details

hippo4j Includes Hard Coded Secret Key in JWT Creation hippo4j 1.0.0 to 1.5.0, uses a hard-coded secret key in its JWT (JSON Web Token) creation. This allows attackers with access to the source code or compiled binary to forge valid access tokens and impersonate any user, including privileged ones such as "admin". The vulnerability poses a critical security risk in systems where authentication and authorization rely on the integrity of JWTs.

Metadata

Created: 2025-08-21T21:32:08Z
Modified: 2025-08-22T20:30:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-48cg-9c55-j2q7/GHSA-48cg-9c55-j2q7.json
CWE IDs: ["CWE-798"]
Alternative ID: GHSA-48cg-9c55-j2q7
Finding: F009
Auto approve: 1