Description
Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1.
Scores
CVSS v4
6.3
EPSS
0.0030
EPSS Percentile
53.4%
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-338
Status
published
Products (2)
guzzle/oauth-subscriber
< 0.8.1
guzzlehttp/oauth-subscriber
0 - 0.8.1Packagist
Published
Jan 06, 2025
Tracked Since
Feb 18, 2026