{"id":"CVE-2025-9604","details":"A vulnerability was identified in coze-studio up to 0.2.4. The impacted element is an unknown function of the file backend/domain/plugin/encrypt/aes.go. The manipulation of the argument AuthSecretKey/StateSecretKey/OAuthTokenSecretKey leads to use of hard-coded cryptographic key\r . It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is regarded as difficult. To fix this issue, it is recommended to deploy a patch. The vendor replied to the GitHub issue (translated from simplified Chinese): \"For scenarios requiring encryption, we will implement user-defined key management through configuration and optimize the use of encryption tools, such as random salt.\"","modified":"2026-05-04T08:50:34.523720Z","published":"2025-08-29T02:15:32.730Z","withdrawn":"2026-05-04T08:50:34.523720Z","references":[{"type":"WEB","url":"https://vuldb.com/?ctiid.321780"},{"type":"WEB","url":"https://vuldb.com/?id.321780"},{"type":"WEB","url":"https://vuldb.com/?submit.636417"},{"type":"REPORT","url":"https://github.com/coze-dev/coze-studio/issues/505"},{"type":"REPORT","url":"https://github.com/coze-dev/coze-studio/issues/505#issuecomment-3148568862"},{"type":"FIX","url":"https://github.com/coze-dev/coze-studio/pull/533"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-9604.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"configuration"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"}]}