Low severityNVD Advisory· Published Jun 12, 2025· Updated Jun 13, 2025
Vantage6 Server JWT secret not cryptographically secure
CVE-2025-43866
Description
vantage6 is an open-source infrastructure for privacy preserving analysis. The JWT secret key in the vantage6 server is auto-generated unless defined by the user. The auto-generated key is a UUID1, which is not cryptographically secure as it is predictable to some extent. This vulnerability is fixed in 4.11.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
vantage6-serverPyPI | < 4.11.0 | 4.11.0 |
Affected products
1Patches
1e39a262faf1cMerge commit from fork
1 file changed · +1 −1
vantage6-server/vantage6/server/__init__.py+1 −1 modified@@ -301,7 +301,7 @@ def configure_flask(self) -> None: # If no secret is set in the config file, one is generated. This # implies that all (even refresh) tokens will be invalidated on restart self.app.config["JWT_SECRET_KEY"] = self.ctx.config.get( - "jwt_secret_key", str(uuid.uuid1()) + "jwt_secret_key", str(uuid.uuid4()) ) # Default expiration time
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4- github.com/advisories/GHSA-m3mq-f375-5vghghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-43866ghsaADVISORY
- github.com/vantage6/vantage6/commit/e39a262faf1cd4c554bf1b8e57eeea082da995c0ghsaWEB
- github.com/vantage6/vantage6/security/advisories/GHSA-m3mq-f375-5vghghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.