Insecure Session ID Generation in Starch by Bluefeet
CVE-2025-40925
What is CVE-2025-40925?
The Starch product from Bluefeet has a significant vulnerability in the way it generates session IDs. Versions 0.14 and earlier utilize a default generator that combines several easily guessable parameters, including a SHA-1 hash, a counter, and the built-in rand function. The method used is unsuitable for cryptographic purposes, making session IDs predictable. This predictability could allow attackers to exploit the system by gaining unauthorized access, highlighting the importance of adopting secure session management practices. Users are encouraged to update to the latest version to mitigate the risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Starch 0.01 <= 0.14
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
