HomeApacheCVE-2025-53960

CVE-2025-53960

MEDIUM
5.9CVSS
Published: 2025-12-12
Updated: 2025-12-16
AI Analysis

Description

When issuing JSON Web Tokens (JWT), Apache StreamPark directly uses the user's password as the HMAC signing key (e.g., with the HS256 algorithm). An attacker can exploit this vulnerability to perform offline brute-force attacks on the user's password using a captured JWT, or to arbitrarily forge identity tokens for the user if the password is already known, ultimately leading to complete account takeover. This issue affects Apache StreamPark: from 2.0.0 before 2.1.7. Users are recommended to upgrade to version 2.1.7, which fixes the issue.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
network
Complexity
high
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
none
Availability
none
Weaknesses
CWE-1240

Metadata

Primary Vendor
APACHE
Published
12/12/2025
Last Modified
12/16/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

apache : streampark

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-53960 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com