Skip to main content

CVE-2025-7789: Password Hash With Insufficient Computational Effort in Xuxueli xxl-job

Medium
VulnerabilityCVE-2025-7789cvecve-2025-7789
Published: Fri Jul 18 2025 (07/18/2025, 15:14:05 UTC)
Source: CVE Database V5
Vendor/Project: Xuxueli
Product: xxl-job

Description

A vulnerability was found in Xuxueli xxl-job up to 3.1.1 and classified as problematic. Affected by this issue is the function makeToken of the file src/main/java/com/xxl/job/admin/controller/IndexController.java of the component Token Generation. The manipulation leads to password hash with insufficient computational effort. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/18/2025, 15:46:13 UTC

Technical Analysis

CVE-2025-7789 is a vulnerability identified in the Xuxueli xxl-job software, specifically affecting versions 3.1.0 and 3.1.1. The issue resides in the makeToken function within the Token Generation component, located in the source file src/main/java/com/xxl/job/admin/controller/IndexController.java. The vulnerability involves the generation of password hashes with insufficient computational effort, meaning the hashing algorithm or its implementation does not require enough processing time or complexity to effectively resist brute-force or password cracking attempts. This weakness can allow an attacker to more easily compute or guess password hashes, potentially leading to unauthorized access or token forgery. The attack vector is remote, indicating that exploitation can occur over a network without physical access. However, the attack complexity is rated as high, and exploitation is considered difficult, which suggests that a successful attack would require significant skill, resources, or specific conditions. No privileges or user interaction are required for exploitation, increasing the risk profile. The CVSS 4.0 base score is 6.3 (medium severity), reflecting moderate impact primarily on confidentiality due to the low confidentiality impact vector, with no impact on integrity or availability. The vulnerability has been publicly disclosed, but there are no known exploits in the wild at this time. The lack of available patches or fixes at the time of publication indicates that affected organizations need to apply mitigations or monitor for updates from the vendor. Overall, this vulnerability represents a cryptographic weakness in token generation that could be leveraged to compromise authentication mechanisms if exploited successfully.

Potential Impact

For European organizations using Xuxueli xxl-job versions 3.1.0 or 3.1.1, this vulnerability poses a moderate risk. The insufficient computational effort in password hashing could allow attackers to perform offline brute-force attacks more efficiently against authentication tokens, potentially leading to unauthorized access to job scheduling or administrative functions. This could disrupt critical business processes, expose sensitive operational data, or allow attackers to manipulate scheduled jobs, which may have cascading effects on business continuity. Although exploitation is difficult and no active exploits are known, the public disclosure increases the risk of future attacks. European organizations in sectors relying heavily on automated job scheduling and task management, such as manufacturing, finance, and IT services, could be particularly impacted. The vulnerability’s remote attack vector and lack of required privileges mean that exposed systems accessible over the internet or internal networks are at risk. Confidentiality is the primary concern, but integrity and availability impacts are minimal based on current knowledge. However, successful exploitation could lead to privilege escalation or lateral movement if combined with other vulnerabilities.

Mitigation Recommendations

Given the absence of an official patch at the time of disclosure, European organizations should implement several specific mitigations: 1) Restrict network access to xxl-job administrative interfaces using firewalls or VPNs to limit exposure to trusted users only. 2) Implement strong monitoring and logging of authentication attempts and token generation activities to detect anomalous behavior indicative of brute-force or token forgery attempts. 3) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting token generation endpoints. 4) If feasible, upgrade to newer versions of xxl-job once patches addressing this vulnerability are released. 5) Employ compensating controls such as multi-factor authentication (MFA) on administrative accounts to reduce the impact of compromised tokens. 6) Conduct regular security assessments and penetration tests focusing on authentication mechanisms to identify potential exploitation paths. 7) Educate system administrators about this vulnerability and the importance of timely updates and access controls. These targeted actions go beyond generic advice by focusing on access restriction, detection, and compensating controls tailored to the nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-18T07:33:44.888Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687a68bea83201eaacf49364

Added to database: 7/18/2025, 3:31:10 PM

Last enriched: 7/18/2025, 3:46:13 PM

Last updated: 8/11/2025, 5:45:54 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats