CVE-2025-21617

Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1.
CVSS

No CVSS.

Configurations

No configuration.

History

06 Jan 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-06 20:15

Updated : 2025-01-06 20:15


NVD link : CVE-2025-21617

Mitre link : CVE-2025-21617

CVE.ORG link : CVE-2025-21617


JSON object : View

Products Affected

No product.

CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)