Insecure Session ID Generation in Starch by Bluefeet
CVE-2025-40925

9.1CRITICAL

Key Information:

Vendor

Bluefeet

Status
Vendor
CVE Published:
20 September 2025

What is CVE-2025-40925?

The Starch product from Bluefeet has a significant vulnerability in the way it generates session IDs. Versions 0.14 and earlier utilize a default generator that combines several easily guessable parameters, including a SHA-1 hash, a counter, and the built-in rand function. The method used is unsuitable for cryptographic purposes, making session IDs predictable. This predictability could allow attackers to exploit the system by gaining unauthorized access, highlighting the importance of adopting secure session management practices. Users are encouraged to update to the latest version to mitigate the risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Starch 0.01 <= 0.14

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.