Improper Input Validation (CWE-20)
A vulnerability related to static hash generation in Node.js/io.js versions prior to 3.0.0, where static hashes are outputted and used as keys or passwords, which can completely undermine security. The issue involves improper input validation that allows generation of predictable or insecure cryptographic keys.
An attacker could potentially: - Exploit predictable cryptographic keys - Compromise system security by using static, weak hash generation - Gain unauthorized access to systems using vulnerable Node.js versions - Potentially decrypt or manipulate cryptographically protected data
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
Patches are available through GitHub Advisory and Red Hat
Immediate recommended actions: - Upgrade Node.js/io.js to version 3.0.0 or later - Audit all systems using Node.js versions < 3.0.0 - Review and regenerate any cryptographic keys generated during vulnerable period - Verify no residual static hash usage in critical systems
NVD published the first details for CVE-2025-6547
A CVSS base score of 9.1 has been assigned.
Feedly found the first article mentioning CVE-2025-6547. See article
Feedly estimated the CVSS score as HIGH
RedHat CVE advisory released a security advisory (CVE-2025-6547).
A CVSS base score of 8.1 has been assigned.
FIRST assigned an EPSS Score of 0.04% (Percentile: 12.2%)
FIRST assigned an EPSS Score of 0.09% (Percentile: 25.7%)
[GHSA-v62p-rq8g-8h59] pbkdf2 silently disregards Uint8Array input, returning static keys
Fedora EPEL 8 update for yarnpkg
CVE-2025-6547
CVE-2025-6547
[GHSA-v62p-rq8g-8h59] pbkdf2 silently disregards Uint8Array input, returning static keys
NA - CVE-2025-6547 - Improper Input Validation vulnerability in...