CVE-2025-53960

CWE-12405 documents5 sources
Severity
5.9MEDIUM
EPSS
0.1%
top 74.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 12

Description

When issuing JSON Web Tokens (JWT), Apache StreamPark directly uses the user's password as the HMAC signing key (e.g., with the HS256 algorithm). An attacker can exploit this vulnerability to perform offline brute-force attacks on the user's password using a captured JWT, or to arbitrarily forge identity tokens for the user if the password is already known, ultimately leading to complete account takeover. This issue affects Apache StreamPark: from 2.0.0 before 2.1.7. Users are recommended to

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages3 packages

NVDapache/streampark2.0.02.1.7
Mavenorg.apache.streampark:streampark2.0.02.1.7

🔴Vulnerability Details

3
GHSA
Apache StreamPark: Use the user’s password as the secret key Vulnerability2025-12-12
CVEList
Apache StreamPark: Uses the user’s password as the secret key2025-12-12
OSV
Apache StreamPark: Use the user’s password as the secret key Vulnerability2025-12-12

🕵️Threat Intelligence

1
Wiz
CVE-2025-53960 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-53960 (MEDIUM CVSS 5.9) | When issuing JSON Web Tokens (JWT) | cvebase.io