High severity8.8GHSA Advisory· Published Aug 21, 2025· Updated Apr 15, 2026
CVE-2025-51606
CVE-2025-51606
Description
hippo4j 1.0.0 to 1.5.0, uses a hard-coded secret key in its JWT (JSON Web Token) creation. This allows attackers with access to the source code or compiled binary to forge valid access tokens and impersonate any user, including privileged ones such as "admin". The vulnerability poses a critical security risk in systems where authentication and authorization rely on the integrity of JWTs.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
cn.hippo4j:hippo4j-coreMaven | >= 1.0.0, <= 1.5.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-48cg-9c55-j2q7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-51606ghsaADVISORY
- github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250610-01.mdnvdWEB
- github.com/opengoofy/hippo4j/blob/7d78be3cab526501ad876495862f4cec108da2af/threadpool/server/auth/src/main/java/cn/hippo4j/auth/security/JwtTokenManager.javaghsaWEB
News mentions
0No linked articles in our index yet.