CVE-2026-9370 PUBLISHED

ulisesbocchio jasypt-spring-boot Password Hash SimpleGCMConfig.java getSecretKeySaltGenerator hash predictable salt

Assigner: VulDB
Reserved: 23.05.2026 Published: 24.05.2026 Updated: 24.05.2026

A weakness has been identified in ulisesbocchio jasypt-spring-boot up to 3.0.5/4.0.4. Affected by this vulnerability is the function getSecretKeySaltGenerator of the file jasypt-spring-boot/src/main/java/com/ulisesbocchio/jasyptspringboot/encryptor/SimpleGCMConfig.java of the component Password Hash Handler. Executing a manipulation can lead to use of a one-way hash with a predictable salt. The attack can be launched remotely. The attack requires a high level of complexity. The exploitation appears to be difficult. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.3

Product Status

Vendor ulisesbocchio
Product jasypt-spring-boot
Versions
  • Version 3.0.0 is affected
  • Version 3.0.1 is affected
  • Version 3.0.2 is affected
  • Version 3.0.3 is affected
  • Version 3.0.4 is affected
  • Version 3.0.5 is affected
  • Version 4.0.0 is affected
  • Version 4.0.1 is affected
  • Version 4.0.2 is affected
  • Version 4.0.3 is affected
  • Version 4.0.4 is affected

Credits

  • zyhhoward (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Use of a One-Way Hash with a Predictable Salt CWE
  • One-Way Hash without Salt CWE