Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14761: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in AWS AWS SDK for PHP

0
Medium
VulnerabilityCVE-2025-14761cvecve-2025-14761cwe-327
Published: Wed Dec 17 2025 (12/17/2025, 20:13:54 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: AWS SDK for PHP

Description

Missing cryptographic key commitment in the AWS SDK for PHP may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade AWS SDK for PHP to version 3.368.0 or later

AI-Powered Analysis

AILast updated: 12/17/2025, 20:44:25 UTC

Technical Analysis

CVE-2025-14761 identifies a cryptographic vulnerability in the AWS SDK for PHP, specifically in its client-side encryption library used for encrypting and decrypting records stored in Amazon S3. The root cause is the absence of cryptographic key commitment when encrypted data keys (EDKs) are stored in an "instruction file" instead of the S3 object's metadata. Key commitment is a cryptographic technique that binds the ciphertext to the key, preventing substitution attacks. Without this, an attacker with write access to the S3 bucket can replace the EDK with a malicious one that decrypts to different plaintext, effectively allowing undetected tampering with encrypted data. This vulnerability impacts the integrity of encrypted data but does not compromise confidentiality or availability. The CVSS v3.1 score is 5.3 (medium), reflecting the need for low privileges (write access to the bucket), network attack vector, and no user interaction, but with a higher attack complexity. AWS has fixed this issue in SDK for PHP version 3.368.0 and later. Organizations using earlier versions for client-side encryption with S3 should upgrade to prevent potential data integrity violations. No known exploits have been reported in the wild as of now.

Potential Impact

For European organizations, this vulnerability primarily threatens the integrity of encrypted data stored in Amazon S3 when using the AWS SDK for PHP for client-side encryption. Attackers with write access to the S3 bucket could substitute encrypted data keys, causing decryption to yield altered plaintext without detection. This could lead to data corruption, unauthorized data manipulation, or injection of malicious content, potentially impacting business operations, compliance with data integrity regulations (such as GDPR), and trust in cloud storage solutions. Since confidentiality and availability are not directly affected, the risk is focused on data integrity and the reliability of encrypted data. Organizations relying on client-side encryption for sensitive or regulated data in S3 should consider this a significant risk. The requirement for write access to the S3 bucket means that internal threat actors or compromised credentials pose the greatest risk. The absence of known exploits reduces immediate urgency but does not eliminate the threat, especially in environments with lax access controls.

Mitigation Recommendations

1. Upgrade the AWS SDK for PHP to version 3.368.0 or later immediately to ensure the cryptographic key commitment is properly implemented. 2. Review and tighten S3 bucket permissions to restrict write access only to trusted users and services, minimizing the risk of unauthorized EDK substitution. 3. Implement monitoring and alerting on S3 bucket write activities, especially changes to instruction files or metadata related to encrypted objects. 4. Conduct audits of existing encrypted data to detect any anomalies or signs of tampering that could indicate exploitation. 5. Educate development and DevOps teams about secure usage of client-side encryption libraries and the importance of keeping SDKs up to date. 6. Consider additional cryptographic integrity checks at the application level to detect unauthorized modifications to encrypted data. 7. Regularly review AWS security best practices and compliance requirements related to encryption and key management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMZN
Date Reserved
2025-12-16T00:24:29.842Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943126ec9138a40d2ed3254

Added to database: 12/17/2025, 8:28:30 PM

Last enriched: 12/17/2025, 8:44:25 PM

Last updated: 12/18/2025, 3:53:39 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats