Intel

AIKIDO-2025-10882

ulid is vulnerable to Use of Insufficiently Random Values

Use of Insufficiently Random Values Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

18

Low Risk

This Affects:

JSulid
3.0.0 - 3.0.1
Fixed in 3.0.2

TL;DR

Affected versions of this package are vulnerable to weak random ID generation. Due to incorrect processing of random bytes, the PRNG produces biased output, causing some characters to appear more frequently than others. This reduces entropy, making generated IDs more predictable and enabling partial resource enumeration.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

ulid is vulnerable to Use of Insufficiently Random Values in versions 3.0.0 - 3.0.1.

How to fix this

Upgrade the ulid library to the patch version.