VYPR
Low severityNVD Advisory· Published Jun 12, 2025· Updated Jun 13, 2025

Vantage6 Server JWT secret not cryptographically secure

CVE-2025-43866

Description

vantage6 is an open-source infrastructure for privacy preserving analysis. The JWT secret key in the vantage6 server is auto-generated unless defined by the user. The auto-generated key is a UUID1, which is not cryptographically secure as it is predictable to some extent. This vulnerability is fixed in 4.11.0.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
vantage6-serverPyPI
< 4.11.04.11.0

Affected products

1

Patches

1
e39a262faf1c

Merge commit from fork

https://github.com/vantage6/vantage6Bart van BeusekomJun 11, 2025via ghsa
1 file changed · +1 1
  • vantage6-server/vantage6/server/__init__.py+1 1 modified
    @@ -301,7 +301,7 @@ def configure_flask(self) -> None:
             # If no secret is set in the config file, one is generated. This
             # implies that all (even refresh) tokens will be invalidated on restart
             self.app.config["JWT_SECRET_KEY"] = self.ctx.config.get(
    -            "jwt_secret_key", str(uuid.uuid1())
    +            "jwt_secret_key", str(uuid.uuid4())
             )
     
             # Default expiration time
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.