CVE-2025-10080: Use of Hard-coded Cryptographic Key in running-elephant Datart
A vulnerability has been found in running-elephant Datart up to 1.0.0-rc3. Affected by this issue is the function getTokensecret of the file datart/security/src/main/java/datart/security/util/AESUtil.java of the component API. The manipulation leads to use of hard-coded cryptographic key . The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-10080 is a vulnerability identified in the running-elephant Datart software versions 1.0.0-rc1 through 1.0.0-rc3. The issue resides in the getTokensecret function within the AESUtil.java file of the datart/security component. Specifically, the vulnerability stems from the use of a hard-coded cryptographic key for encryption operations. Hard-coded keys are a significant security risk because they can be extracted by attackers who gain access to the software binaries or source code, allowing them to decrypt sensitive data or forge authentication tokens. The vulnerability can be exploited remotely without user interaction; however, the attack complexity is high, and exploitation is considered difficult. The CVSS 4.0 vector indicates that the attack requires network access (AV:N), has high complexity (AC:H), does not require privileges (PR:L), no user interaction (UI:N), and results in low confidentiality impact (VC:L) with no impact on integrity or availability. Although the exploit has been publicly disclosed, there are no known exploits in the wild currently. The vulnerability affects the API component of Datart, which is a data visualization and business intelligence platform, potentially exposing sensitive token secrets used for authentication or encryption. The presence of a hard-coded key undermines the cryptographic security model, potentially allowing attackers to bypass authentication or decrypt confidential data if they can extract the key. Given the high complexity and low impact ratings, exploitation is not trivial and would likely require significant effort or additional vulnerabilities to be chained for a successful attack.
Potential Impact
For European organizations using running-elephant Datart versions 1.0.0-rc1 to 1.0.0-rc3, this vulnerability could lead to unauthorized access to sensitive data or services protected by the compromised cryptographic keys. Since Datart is used for data analytics and visualization, the exposure of token secrets could allow attackers to impersonate legitimate users or decrypt sensitive business intelligence data. This could result in confidentiality breaches, potentially exposing proprietary or personal data, which would have compliance implications under GDPR. However, the low CVSS score and high attack complexity suggest that the risk of widespread exploitation is limited. Organizations with high-value data or those operating in regulated sectors (finance, healthcare, government) may face greater risks if attackers succeed in exploiting this vulnerability. The lack of known active exploits reduces immediate threat levels but does not eliminate future risk, especially if attackers develop more effective exploitation techniques. Additionally, the vulnerability could be leveraged as part of a multi-stage attack chain, increasing its potential impact in targeted attacks against European enterprises.
Mitigation Recommendations
European organizations should prioritize upgrading running-elephant Datart to versions beyond 1.0.0-rc3 where this vulnerability is patched. If an immediate upgrade is not feasible, organizations should implement compensating controls such as restricting network access to the Datart API to trusted internal networks and enforcing strict authentication and authorization policies. Code audits should be performed to identify and remove any hard-coded cryptographic keys, replacing them with secure key management solutions that use environment variables or dedicated secrets management systems. Additionally, monitoring and logging should be enhanced to detect anomalous access patterns or token usage indicative of exploitation attempts. Organizations should also conduct penetration testing focused on cryptographic key extraction and token forgery to assess their exposure. Finally, educating developers on secure coding practices around cryptographic key management will help prevent similar vulnerabilities in future releases.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-10080: Use of Hard-coded Cryptographic Key in running-elephant Datart
Description
A vulnerability has been found in running-elephant Datart up to 1.0.0-rc3. Affected by this issue is the function getTokensecret of the file datart/security/src/main/java/datart/security/util/AESUtil.java of the component API. The manipulation leads to use of hard-coded cryptographic key . The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10080 is a vulnerability identified in the running-elephant Datart software versions 1.0.0-rc1 through 1.0.0-rc3. The issue resides in the getTokensecret function within the AESUtil.java file of the datart/security component. Specifically, the vulnerability stems from the use of a hard-coded cryptographic key for encryption operations. Hard-coded keys are a significant security risk because they can be extracted by attackers who gain access to the software binaries or source code, allowing them to decrypt sensitive data or forge authentication tokens. The vulnerability can be exploited remotely without user interaction; however, the attack complexity is high, and exploitation is considered difficult. The CVSS 4.0 vector indicates that the attack requires network access (AV:N), has high complexity (AC:H), does not require privileges (PR:L), no user interaction (UI:N), and results in low confidentiality impact (VC:L) with no impact on integrity or availability. Although the exploit has been publicly disclosed, there are no known exploits in the wild currently. The vulnerability affects the API component of Datart, which is a data visualization and business intelligence platform, potentially exposing sensitive token secrets used for authentication or encryption. The presence of a hard-coded key undermines the cryptographic security model, potentially allowing attackers to bypass authentication or decrypt confidential data if they can extract the key. Given the high complexity and low impact ratings, exploitation is not trivial and would likely require significant effort or additional vulnerabilities to be chained for a successful attack.
Potential Impact
For European organizations using running-elephant Datart versions 1.0.0-rc1 to 1.0.0-rc3, this vulnerability could lead to unauthorized access to sensitive data or services protected by the compromised cryptographic keys. Since Datart is used for data analytics and visualization, the exposure of token secrets could allow attackers to impersonate legitimate users or decrypt sensitive business intelligence data. This could result in confidentiality breaches, potentially exposing proprietary or personal data, which would have compliance implications under GDPR. However, the low CVSS score and high attack complexity suggest that the risk of widespread exploitation is limited. Organizations with high-value data or those operating in regulated sectors (finance, healthcare, government) may face greater risks if attackers succeed in exploiting this vulnerability. The lack of known active exploits reduces immediate threat levels but does not eliminate future risk, especially if attackers develop more effective exploitation techniques. Additionally, the vulnerability could be leveraged as part of a multi-stage attack chain, increasing its potential impact in targeted attacks against European enterprises.
Mitigation Recommendations
European organizations should prioritize upgrading running-elephant Datart to versions beyond 1.0.0-rc3 where this vulnerability is patched. If an immediate upgrade is not feasible, organizations should implement compensating controls such as restricting network access to the Datart API to trusted internal networks and enforcing strict authentication and authorization policies. Code audits should be performed to identify and remove any hard-coded cryptographic keys, replacing them with secure key management solutions that use environment variables or dedicated secrets management systems. Additionally, monitoring and logging should be enhanced to detect anomalous access patterns or token usage indicative of exploitation attempts. Organizations should also conduct penetration testing focused on cryptographic key extraction and token forgery to assess their exposure. Finally, educating developers on secure coding practices around cryptographic key management will help prevent similar vulnerabilities in future releases.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-07T14:58:28.193Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68be4aede3f0bafba8ab80f8
Added to database: 9/8/2025, 3:18:05 AM
Last enriched: 9/8/2025, 3:33:11 AM
Last updated: 9/8/2025, 12:35:11 PM
Views: 8
Related Threats
CVE-2025-36853: CWE-190: Integer Overflow or Wraparound in Microsoft .NET 6.0
HighCVE-2025-36854: CWE-416: Use After Free in Microsoft .NET 6.0
HighCVE-2025-36855: CWE-126: Buffer Over-read in Microsoft .NET 6.0
HighCVE-2025-22956: n/a
HighCVE-2025-3212: CWE-416 Use After Free in Arm Ltd Bifrost GPU Kernel Driver
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.