-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the randomBytes function in xsrf.go using math/rand (with time.UTC().UnixNano() seeding) instead of a cryptographically secure PRNG. The commit 3776f33 explicitly replaces this implementation with crypto/rand, confirming this was the vulnerable component. The function's use of predictable random number generation directly enables CSRF token prediction as described in CWE-332 and CWE-352.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/dinever/golf | go | < 0.3.0 | 0.3.0 |