Bug 2362485 (CVE-2025-46653) - CVE-2025-46653 formidable: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Formidable
Summary: CVE-2025-46653 formidable: Use of Cryptographically Weak Pseudo-Random Number...
Keywords:
Status: NEW
Alias: CVE-2025-46653
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2362620 2362621 2362622 2362623 2362624 2362625 2362626 2362627 2362628 2362629 2362630 2362631 2362632 2362633 2362634 2362635 2362636 2362637
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-04-26 21:01 UTC by OSIDB Bzimport
Modified: 2025-04-28 05:22 UTC (History)
28 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-04-26 21:01:07 UTC
Formidable (aka node-formidable) 2.1.0 through 3.x before 3.5.3 relies on hexoid to prevent guessing of filenames for untrusted executable content; however, hexoid is documented as not "cryptographically secure." (Also, there is a scenario in which only the last two characters of a hexoid string need to be guessed, but this is not often relevant.) NOTE: this does not imply that, in a typical use case, attackers will be able to exploit any hexoid behavior to upload and execute their own content.


Note You need to log in before you can comment on or make changes to this bug.