AES256 Text Encryption Vulnerability in Sakai Collaboration Environment
CVE-2025-62710

2.6LOW

Key Information:

Status
Vendor
CVE Published:
22 October 2025

What is CVE-2025-62710?

The Sakai Collaboration and Learning Environment is susceptible to a vulnerability where the EncryptionUtilityServiceImpl improperly initializes the AES256TextEncryptor's serverSecretKey. This flaw stems from the utilization of java.util.Random, a non-cryptographic pseudorandom number generator (PRNG), which can produce predictable outputs under certain conditions. As a result, an attacker capable of accessing encrypted data (such as exported or stored strings) may exploit this weakness to reconstruct the serverSecretKey by approximating the PRNG seed, allowing them to decrypt sensitive information. Updates in versions 23.5 and 25.0 address this issue.

Affected Version(s)

sakai < 23.5 < 23.5

sakai < 25.0 < 25.0

References

CVSS V3.1

Score:
2.6
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-62710 : AES256 Text Encryption Vulnerability in Sakai Collaboration Environment