Use of a broken or risky cryptographic algorithm in Sulu - #VU131127
Published: May 12, 2026
Sulu
Detailed vulnerability description
The vulnerability allows a remote user to compromise the security of generated api keys and password reset tokens.
The vulnerability exists due to use of a broken or risky cryptographic algorithm in API key generation and password reset token generation when generating security tokens. A remote user can obtain or predict weakly generated values to compromise the security of generated api keys and password reset tokens.