CVE-2025-59354

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the DragonFly2 uses a variety of hash functions, including the MD5 hash, for downloaded files. This allows attackers to replace files with malicious ones that have a colliding hash. This vulnerability is fixed in 2.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:*

History

18 Sep 2025, 20:08

Type Values Removed Values Added
First Time Linuxfoundation
Linuxfoundation dragonfly
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References () https://github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf - () https://github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf - Product
References () https://github.com/dragonflyoss/dragonfly/security/advisories/GHSA-hx2h-vjw2-8r54 - () https://github.com/dragonflyoss/dragonfly/security/advisories/GHSA-hx2h-vjw2-8r54 - Patch, Third Party Advisory
CPE cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:*

17 Sep 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-17 20:15

Updated : 2025-09-18 20:08


NVD link : CVE-2025-59354

Mitre link : CVE-2025-59354

CVE.ORG link : CVE-2025-59354


JSON object : View

Products Affected

linuxfoundation

  • dragonfly
CWE
CWE-328

Use of Weak Hash