Ad

CVE-2025-62710

MEDIUM CVSS 3.1: 5.9 EPSS 0.02%
Updated Oct 30, 2025
Sakailms
Parameter Value
CVSS 5.9 (MEDIUM)
Affected Versions before 23.5
Fixed In 23.5
Type CWE-337
Vendor Sakailms
Public PoC No

Sakai is a Collaboration and Learning Environment. Prior to versions 23.5 and 25.0, EncryptionUtilityServiceImpl initialized an AES256TextEncryptor password (serverSecretKey) using RandomStringUtils with the default java.util.Random. java.util.Random is a non‑cryptographic PRNG and can be predicted from limited state/seed information (e.g., start time window), substantially reducing the effective search space of the generated key. An attacker who can obtain ciphertexts (e.g., exported or at‑rest strings protected by this service) and approximate the PRNG seed can feasibly reconstruct the serverSecretKey and decrypt affected data.

SAK-49866 is patched in Sakai 23.5, 25.0, and trunk.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
High
Difficult to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
None
No data modification
Availability
None
No disruption

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Sakailms Sakai
cpe:2.3:a:sakailms:sakai:*:*:*:*:*:*:*:*
23.5

Related Vulnerabilities