CVE-2025-14761: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in AWS AWS SDK for PHP
Missing cryptographic key commitment in the AWS SDK for PHP may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade AWS SDK for PHP to version 3.368.0 or later
AI Analysis
Technical Summary
CVE-2025-14761 identifies a cryptographic vulnerability in the AWS SDK for PHP, specifically in its client-side encryption library used for encrypting and decrypting records stored in Amazon S3. The root cause is the absence of cryptographic key commitment when encrypted data keys (EDKs) are stored in an "instruction file" instead of the S3 object's metadata. Key commitment is a cryptographic technique that binds the ciphertext to the key, preventing substitution attacks. Without this, an attacker with write access to the S3 bucket can replace the EDK with a malicious one that decrypts to different plaintext, effectively allowing undetected tampering with encrypted data. This vulnerability impacts the integrity of encrypted data but does not compromise confidentiality or availability. The CVSS v3.1 score is 5.3 (medium), reflecting the need for low privileges (write access to the bucket), network attack vector, and no user interaction, but with a higher attack complexity. AWS has fixed this issue in SDK for PHP version 3.368.0 and later. Organizations using earlier versions for client-side encryption with S3 should upgrade to prevent potential data integrity violations. No known exploits have been reported in the wild as of now.
Potential Impact
For European organizations, this vulnerability primarily threatens the integrity of encrypted data stored in Amazon S3 when using the AWS SDK for PHP for client-side encryption. Attackers with write access to the S3 bucket could substitute encrypted data keys, causing decryption to yield altered plaintext without detection. This could lead to data corruption, unauthorized data manipulation, or injection of malicious content, potentially impacting business operations, compliance with data integrity regulations (such as GDPR), and trust in cloud storage solutions. Since confidentiality and availability are not directly affected, the risk is focused on data integrity and the reliability of encrypted data. Organizations relying on client-side encryption for sensitive or regulated data in S3 should consider this a significant risk. The requirement for write access to the S3 bucket means that internal threat actors or compromised credentials pose the greatest risk. The absence of known exploits reduces immediate urgency but does not eliminate the threat, especially in environments with lax access controls.
Mitigation Recommendations
1. Upgrade the AWS SDK for PHP to version 3.368.0 or later immediately to ensure the cryptographic key commitment is properly implemented. 2. Review and tighten S3 bucket permissions to restrict write access only to trusted users and services, minimizing the risk of unauthorized EDK substitution. 3. Implement monitoring and alerting on S3 bucket write activities, especially changes to instruction files or metadata related to encrypted objects. 4. Conduct audits of existing encrypted data to detect any anomalies or signs of tampering that could indicate exploitation. 5. Educate development and DevOps teams about secure usage of client-side encryption libraries and the importance of keeping SDKs up to date. 6. Consider additional cryptographic integrity checks at the application level to detect unauthorized modifications to encrypted data. 7. Regularly review AWS security best practices and compliance requirements related to encryption and key management.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Ireland
CVE-2025-14761: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in AWS AWS SDK for PHP
Description
Missing cryptographic key commitment in the AWS SDK for PHP may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade AWS SDK for PHP to version 3.368.0 or later
AI-Powered Analysis
Technical Analysis
CVE-2025-14761 identifies a cryptographic vulnerability in the AWS SDK for PHP, specifically in its client-side encryption library used for encrypting and decrypting records stored in Amazon S3. The root cause is the absence of cryptographic key commitment when encrypted data keys (EDKs) are stored in an "instruction file" instead of the S3 object's metadata. Key commitment is a cryptographic technique that binds the ciphertext to the key, preventing substitution attacks. Without this, an attacker with write access to the S3 bucket can replace the EDK with a malicious one that decrypts to different plaintext, effectively allowing undetected tampering with encrypted data. This vulnerability impacts the integrity of encrypted data but does not compromise confidentiality or availability. The CVSS v3.1 score is 5.3 (medium), reflecting the need for low privileges (write access to the bucket), network attack vector, and no user interaction, but with a higher attack complexity. AWS has fixed this issue in SDK for PHP version 3.368.0 and later. Organizations using earlier versions for client-side encryption with S3 should upgrade to prevent potential data integrity violations. No known exploits have been reported in the wild as of now.
Potential Impact
For European organizations, this vulnerability primarily threatens the integrity of encrypted data stored in Amazon S3 when using the AWS SDK for PHP for client-side encryption. Attackers with write access to the S3 bucket could substitute encrypted data keys, causing decryption to yield altered plaintext without detection. This could lead to data corruption, unauthorized data manipulation, or injection of malicious content, potentially impacting business operations, compliance with data integrity regulations (such as GDPR), and trust in cloud storage solutions. Since confidentiality and availability are not directly affected, the risk is focused on data integrity and the reliability of encrypted data. Organizations relying on client-side encryption for sensitive or regulated data in S3 should consider this a significant risk. The requirement for write access to the S3 bucket means that internal threat actors or compromised credentials pose the greatest risk. The absence of known exploits reduces immediate urgency but does not eliminate the threat, especially in environments with lax access controls.
Mitigation Recommendations
1. Upgrade the AWS SDK for PHP to version 3.368.0 or later immediately to ensure the cryptographic key commitment is properly implemented. 2. Review and tighten S3 bucket permissions to restrict write access only to trusted users and services, minimizing the risk of unauthorized EDK substitution. 3. Implement monitoring and alerting on S3 bucket write activities, especially changes to instruction files or metadata related to encrypted objects. 4. Conduct audits of existing encrypted data to detect any anomalies or signs of tampering that could indicate exploitation. 5. Educate development and DevOps teams about secure usage of client-side encryption libraries and the importance of keeping SDKs up to date. 6. Consider additional cryptographic integrity checks at the application level to detect unauthorized modifications to encrypted data. 7. Regularly review AWS security best practices and compliance requirements related to encryption and key management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- AMZN
- Date Reserved
- 2025-12-16T00:24:29.842Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6943126ec9138a40d2ed3254
Added to database: 12/17/2025, 8:28:30 PM
Last enriched: 12/17/2025, 8:44:25 PM
Last updated: 12/18/2025, 3:53:39 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14856: Code Injection in y_project RuoYi
MediumCVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK
MediumCVE-2025-14837: Code Injection in ZZCMS
MediumKimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.