Description
A security flaw has been discovered in Shinrays Games Goods Triple App up to 1.200. The affected element is an unknown function of the file jRwTX.java of the component cats.goods.sort.sorting.games. Performing a manipulation of the argument AES_IV/AES_PASSWORD results in use of hard-coded cryptographic key
. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitability is described as difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-02
Score: 2 Low
EPSS: n/a
KEV: No
Impact: Exposed hard‑coded cryptographic key enabling local decryption
Action: Apply patch
AI Analysis

Impact

An unknown function in the file jRwTX.java of cats.goods.sort.sorting.games accepts a manipulated AES_IV/AES_PASSWORD argument, causing the application to fall back to a hard‑coded cryptographic key. This flaw exposes a predictable key that can be used by an attacker with local access to decrypt data or forge authentication tokens, thereby compromising confidentiality of stored assets and potentially broader system data if the key is reused elsewhere.

Affected Systems

The vulnerability affects Shinrays Games Goods Triple App versions up to and including 1.200. The issue resides in the component cats.goods.sort.sorting.games, specifically the jRwTX.java source file.

Risk and Exploitability

With a CVSS score of 2.0 the flaw is considered low severity. Exploitation requires local user privileges and is described as difficult, however publicly available code exists. The vulnerability is not listed in CISA's KEV catalog and no EPSS score is available, indicating limited automated exploitation evidence. The local attack requirement reduces the attack surface but still presents a risk for compromised or malicious local users.

Generated by OpenCVE AI on April 2, 2026 at 22:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to Shinrays Games Goods Triple App version 1.201 or newer where the hard‑coded key is removed.
  • If an update is not immediately possible, isolate the application from untrusted local users or disable the cats.goods.sort.sorting.games component.
  • Verify that no hard‑coded keys exist in the deployed configuration and enforce strong random key generation.
  • Monitor application logs for failed decryption or authentication attempts that may indicate exploitation attempts.
  • Contact Shinrays Games to request a security advisory or remediation guidance if a patch is not yet available.

Generated by OpenCVE AI on April 2, 2026 at 22:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Shinrays Games
Shinrays Games goods Triple App
Vendors & Products Shinrays Games
Shinrays Games goods Triple App

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Shinrays Games Goods Triple App up to 1.200. The affected element is an unknown function of the file jRwTX.java of the component cats.goods.sort.sorting.games. Performing a manipulation of the argument AES_IV/AES_PASSWORD results in use of hard-coded cryptographic key . Attacking locally is a requirement. The complexity of an attack is rather high. The exploitability is described as difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Shinrays Games Goods Triple App cats.goods.sort.sorting.games jRwTX.java hard-coded key
Weaknesses CWE-320
CWE-321
References
Metrics cvssV2_0

{'score': 1, 'vector': 'AV:L/AC:H/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2.5, 'vector': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Shinrays Games Goods Triple App
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-02T19:00:17.487Z

Reserved: 2026-04-02T11:46:41.200Z

Link: CVE-2026-5420

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-02T20:16:29.763

Modified: 2026-04-02T20:16:29.763

Link: CVE-2026-5420

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:16:30Z

Weaknesses