Use of a broken or risky cryptographic algorithm in Sulu - #VU131127

 

Use of a broken or risky cryptographic algorithm in Sulu - #VU131127

Published: May 12, 2026


Vulnerability identifier: #VU131127
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-327
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Sulu GmbH
Affected software:
Sulu

Detailed vulnerability description

The vulnerability allows a remote user to compromise the security of generated api keys and password reset tokens.

The vulnerability exists due to use of a broken or risky cryptographic algorithm in API key generation and password reset token generation when generating security tokens. A remote user can obtain or predict weakly generated values to compromise the security of generated api keys and password reset tokens.


Remediation

Install security update from vendor's website.

Sources