CVE-2026-25726
Published: 03 April 2026
Summary
CVE-2026-25726 is a high-severity PRNG (CWE-338) vulnerability in Cloudreve Cloudreve. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SC-12 (Cryptographic Key Establishment and Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires secure cryptographic key establishment and management with sufficient entropy, directly preventing generation of predictable secret_key using weak PRNG seeding.
Mandates timely flaw remediation including patching to version 4.13.0, which fixes the weak PRNG for critical secrets and eliminates the vulnerability.
Ensures authenticators such as the JWT signing secret_key have sufficient strength of mechanism, countering weak pseudo-random generation vulnerable to brute-force seed prediction.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in public-facing Cloudreve enables remote exploitation (T1190) to brute-force weak PRNG-derived secrets and forge JWTs (T1606), impersonating users via valid accounts (T1078) for privilege escalation (T1068).
NVD Description
Cloudreve is a self-hosted file management and sharing system. Prior to version 4.13.0, the application uses the weak pseudo-random number generator math/rand seeded with time.Now().UnixNano() to generate critical security secrets, including the secret_key, and hash_id_salt. These secrets are generated upon…
more
first startup and persisted in the database. An attacker can exploit this by obtaining the administrator's account creation time (via public API endpoints) to narrow the search window for the PRNG seed, and use known hashid to validate the seed. By brute-forcing the seed (demonstrated to take <3 hours on general consumer PC), an attacker can predict the secret_key. This allows them to forge valid JSON Web Tokens (JWTs) for any user, including administrators, leading to full account takeover and privilege escalation. This issue has been patched in version 4.13.0.
Deeper analysisAI
CVE-2026-25726 affects Cloudreve, an open-source self-hosted file management and sharing system, in versions prior to 4.13.0. The vulnerability stems from the use of a weak pseudo-random number generator from the math/rand package, seeded solely with time.Now().UnixNano(), to generate critical security secrets such as the secret_key and hash_id_salt. These secrets are created during the application's first startup and stored persistently in the database, making them predictable under certain conditions due to the limited entropy in the seed.
A remote attacker without privileges can exploit this issue by first querying public API endpoints to obtain the administrator's account creation time, which narrows the feasible search window for the PRNG seed. Using a known hashid value for validation, the attacker can then brute-force the seed—demonstrated to require less than three hours on a general consumer PC—to derive the secret_key. With the secret_key, the attacker can forge valid JSON Web Tokens (JWTs) impersonating any user, including administrators, resulting in full account takeover and privilege escalation. The CVSS v3.1 base score of 8.1 reflects network accessibility with high attack complexity but high impacts on confidentiality, integrity, and availability (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
The issue has been addressed in Cloudreve version 4.13.0, as detailed in the project's release notes and security advisory. Practitioners should upgrade to this patched version to mitigate the vulnerability, with further details available in the GitHub release at https://github.com/cloudreve/cloudreve/releases/tag/4.13.0 and the advisory at https://github.com/cloudreve/cloudreve/security/advisories/GHSA-f8xp-wvcx-p6f4.
Details
- CWE(s)