The Thinbus Javascript Secure Remote Password (SRP) Client Generates Fewer Bits of Entropy Than Intended
- Severity:
- Medium
Description
A protocol compliance bug in thinbus-srp-npm versions prior to 2.0.1 causes the client to generate a fixed 252 bits of entropy instead of the intended bit length of the safe prime (defaulted to 2048 bits). RFC 5054 states in section 2.5.4 Client Key Exchange
The client key exchange message carries the client’s public value (A).
Recommendation
Update the thinbus-srp package to the latest compatible version. Followings are version details:
- Affected version(s): < 2.0.1
- Patched version(s): 2.0.1
References
Related Issues
- Trix allows Cross-site Scripting via `javascript:` url in a link - CVE-2025-21610
- Strapi Password Hashing is Missing Maximum Password Length Validation - CVE-2025-25298
- happy-dom's `--disallow-code-generation-from-strings` is not sufficient for isolating untrusted JavaScript - CVE-2025-62410
- Signal K Server has Unauthenticated State Pollution leading to Remote Code Execution (RCE) - CVE-2025-66398
- Tags:
- npm
- thinbus-srp
Anything's wrong? Let us know Last updated on August 07, 2025