Inadequate Encryption Strength Affecting github.com/cloudflare/gokey package, versions <0.2.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Inadequate Encryption Strength vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMCLOUDFLAREGOKEY-14157223
  • published2 Dec 2025
  • disclosed2 Dec 2025
  • creditThéo Cusnir

Introduced: 2 Dec 2025

NewCVE-2025-13353  (opens in a new tab)
CWE-326  (opens in a new tab)

How to fix?

Upgrade github.com/cloudflare/gokey to version 0.2.0 or higher.

Overview

Affected versions of this package are vulnerable to Inadequate Encryption Strength due to a flaw in the seed decryption logic resulted in passwords incorrectly being derived solely from the initial vector and the AES-GCM authentication tag of the key seed. An attacker can recover all generated passwords or secrets by possessing only the seed file, without needing the master password.

References

CVSS Base Scores

version 4.0
version 3.1