We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54883

Vision UI's security-kit Contains Cryptographic Weakness



Description

Vision UI is a collection of enterprise-grade, dependency-free modules for modern web projects. In versions 1.4.0 and below, the getSecureRandomInt function in security-kit versions prior to 3.5.0 (packaged in Vision-ui <= 1.4.0) contains a critical cryptographic weakness. Due to a silent 32-bit integer overflow in its internal masking logic, the function fails to produce a uniform distribution of random numbers when the requested range between min and max is larger than 2³². The root cause is the use of a 32-bit bitwise left-shift operation (<<) to generate a bitmask for the rejection sampling algorithm. This causes the mask to be incorrect for any range requiring 32 or more bits of entropy. This issue is fixed in version 1.5.0.

Reserved 2025-07-31 | Published 2025-08-05 | Updated 2025-08-05 | Assigner GitHub_M


CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Product status

< 1.5.0
affected

References

github.com/...ion-ui/security/advisories/GHSA-c9xg-x7h3-mq2q

github.com/...ommit/347355859f05e98047efbd96fc0e61b9191324f1

cve.org (CVE-2025-54883)

nvd.nist.gov (CVE-2025-54883)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54883

Support options

Helpdesk Chat, Email, Knowledgebase