We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53940

Quiet uses insecure, inconsistent verification on local backend token



Description

Quiet is an alternative to team chat apps like Slack, Discord, and Element that does not require trusting a central server or running one's own. In versions 6.1.0-alpha.4 and below, Quiet's API for backend/frontend communication was using an insecure, not constant-time comparison function for token verification. This allowed for a potential timing attack where an attacker would try different token values and observe tiny differences in the response time (wrong characters fail faster) to guess the whole token one character at a time. This is fixed in version 6.0.1.

Reserved 2025-07-14 | Published 2025-07-24 | Updated 2025-07-25 | Assigner GitHub_M


HIGH: 8.5CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:N/SA:N

Problem types

CWE-208: Observable Timing Discrepancy

Product status

< 6.0.1
affected

References

github.com/.../quiet/security/advisories/GHSA-gpw8-w78h-xj67

github.com/TryQuiet/quiet/issues/2820

github.com/TryQuiet/quiet/pull/2928

cve.org (CVE-2025-53940)

nvd.nist.gov (CVE-2025-53940)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53940

Support options

Helpdesk Chat, Email, Knowledgebase