The Thinbus Javascript Secure Remote Password (SRP) Client Generates Fewer Bits of Entropy Than Intended
- Severity:
- Medium
Description
A protocol compliance bug in thinbus-srp-npm versions prior to 2.0.1 causes the client to generate a fixed 252 bits of entropy instead of the intended bit length of the safe prime (defaulted to 2048 bits). RFC 5054 states in section 2.5.4 Client Key Exchange
The client key exchange message carries the client’s public value (A).
Recommendation
Update the thinbus-srp package to the latest compatible version. Followings are version details:
- Affected version(s): < 2.0.1
- Patched version(s): 2.0.1
References
Related Issues
- DocsGPT Allows Remote Code Execution - CVE-2025-0868
- JSONPath Plus allows Remote Code Execution - CVE-2025-1302
- Nuxt has Client-Side Path Traversal in Nuxt Island Payload Revival - CVE-2025-59414
- Undici has Unhandled Exception in WebSocket Client Due to Invalid server_max_window_bits Validation - CVE-2026-2229
- Tags:
- npm
- thinbus-srp
Anything's wrong? Let us know Last updated on August 07, 2025