Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. net.gleske/jervis
  4. ›
  5. CVE-2025-68931

CVE-2025-68931: Jervis's AES CBC Mode is Without Authentication

January 13, 2026 (updated January 21, 2026)

Severity is considered low for internal uses of this library but if there’s any consumer using these methods directly then this is considered critical.

Unlikely to matter due to the design of how AES-256-CBC is used in conjunction with RSA and SHA-256 checksum within Jervis.

Jervis uses RSA to encrypt AES keys and a SHA-256 checksum of the encrypted data in local-only storage inaccessible from the web. After asymmetric decryption and before symmetric decryption, a SHA-256 checksum is performed on the metadata and encrypted data. All encrypted data is discarded if the checksum does not match without attempting to decrypt since the encrypted data is assumed invalid. The data stored is GitHub App authentication tokens which will expire within one hour.

References

  • github.com/advisories/GHSA-gxp5-mv27-vjcj
  • github.com/samrocketman/jervis
  • github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1d8ee2254950fd2231de2b05/src/main/groovy/net/gleske/jervis/tools/SecurityIO.groovy
  • github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1d8ee2254950fd2231de2b05/src/main/groovy/net/gleske/jervis/tools/SecurityIO.groovy
  • github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a
  • github.com/samrocketman/jervis/security/advisories/GHSA-gxp5-mv27-vjcj
  • nvd.nist.gov/vuln/detail/CVE-2025-68931

Code Behaviors & Features

Detect and mitigate CVE-2025-68931 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.2

Fixed versions

  • 2.2

Solution

Upgrade to version 2.2 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication
  • CWE-327: Use of a Broken or Risky Cryptographic Algorithm

Source file

maven/net.gleske/jervis/CVE-2025-68931.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:35:20 +0000.