beego is an open-source web framework for the Go programming language. Versions of beego prior to 2.3.4 use MD5 as a hashing algorithm. MD5 is no longer considered secure against well-funded opponents due to its vulnerability to collision attacks. Version 2.3.4 replaces MD5 with SHA256.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-3454 beego is an open-source web framework for the Go programming language. Versions of beego prior to 2.3.4 use MD5 as a hashing algorithm. MD5 is no longer considered secure against well-funded opponents due to its vulnerability to collision attacks. Version 2.3.4 replaces MD5 with SHA256.
Github GHSA Github GHSA GHSA-9j3m-fr7q-jxfw Beego has Collision Hazards of MD5 in Cache Key Filenames
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 01 Aug 2025 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:beego:beego:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Fri, 13 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Dec 2024 19:30:00 +0000

Type Values Removed Values Added
Description beego is an open-source web framework for the Go programming language. Versions of beego prior to 2.3.4 use MD5 as a hashing algorithm. MD5 is no longer considered secure against well-funded opponents due to its vulnerability to collision attacks. Version 2.3.4 replaces MD5 with SHA256.
Title Beego Vulnerable to Collision Hazards of MD5 in Cache Key Filenames
Weaknesses CWE-327
CWE-328
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-12-13T15:46:22.821Z

Reserved: 2024-12-12T15:00:38.901Z

Link: CVE-2024-55885

cve-icon Vulnrichment

Updated: 2024-12-13T15:46:17.590Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-12T20:15:21.760

Modified: 2025-08-01T20:18:29.800

Link: CVE-2024-55885

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-13T21:06:44Z