Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.streampark/streampark
  4. ›
  5. CVE-2025-53960

CVE-2025-53960: Apache StreamPark: Use the user’s password as the secret key Vulnerability

December 12, 2025

When encrypting sensitive data, weak encryption keys that are fixed or directly generated based on user passwords are used. Attackers can obtain these keys through methods such as reverse engineering, code leaks, or password guessing, thereby decrypting stored or transmitted encrypted data, leading to the leakage of sensitive information.

This issue affects Apache StreamPark: from 2.0.0 before 2.1.7.

Users are recommended to upgrade to version 2.1.7, which fixes the issue.

References

  • github.com/advisories/GHSA-3hg2-rh4r-8qf6
  • github.com/apache/streampark
  • github.com/apache/streampark/commit/39034db0c806168afa82e58e4f376e1e3c3b73e4
  • lists.apache.org/thread/xlpvfzf5l5m5mfyjwrz5h4dssm3c32vy
  • nvd.nist.gov/vuln/detail/CVE-2025-53960

Code Behaviors & Features

Detect and mitigate CVE-2025-53960 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.0.0 before 2.1.7

Fixed versions

  • 2.1.7

Solution

Upgrade to version 2.1.7 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation

Source file

maven/org.apache.streampark/streampark/CVE-2025-53960.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 14 Dec 2025 00:19:15 +0000.