xml-crypto is an XML digital signature and encryption library for Node.js. An attacker may be able to exploit a vulnerability in versions prior to 6.0.1, 3.2.1, and 2.1.6 to bypass authentication or authorization mechanisms in systems that rely on xml-crypto for verifying signed XML documents. The vulnerability allows an attacker to modify a valid signed XML message in a way that still passes signature verification checks. For example, it could be used to alter critical identity or access control attributes, enabling an attacker to escalate privileges or impersonate another user. Users of versions 6.0.0 and prior should upgrade to version 6.0.1 to receive a fix. Those who are still using v2.x or v3.x should upgrade to patched versions 2.1.6 or 3.2.1, respectively.
History

Fri, 04 Apr 2025 03:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:rhdh:1.4::el9

Fri, 28 Mar 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat rhdh
CPEs cpe:/a:redhat:rhdh:1.5::el9
Vendors & Products Redhat
Redhat rhdh

Thu, 27 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

threat_severity

Important


Sat, 15 Mar 2025 21:45:00 +0000

Type Values Removed Values Added
References

Fri, 14 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 14 Mar 2025 17:30:00 +0000

Type Values Removed Values Added
Description xml-crypto is an XML digital signature and encryption library for Node.js. An attacker may be able to exploit a vulnerability in versions prior to 6.0.1, 3.2.1, and 2.1.6 to bypass authentication or authorization mechanisms in systems that rely on xml-crypto for verifying signed XML documents. The vulnerability allows an attacker to modify a valid signed XML message in a way that still passes signature verification checks. For example, it could be used to alter critical identity or access control attributes, enabling an attacker to escalate privileges or impersonate another user. Users of versions 6.0.0 and prior should upgrade to version 6.0.1 to receive a fix. Those who are still using v2.x or v3.x should upgrade to patched versions 2.1.6 or 3.2.1, respectively.
Title xml-crypto Vulnerable to XML Signature Verification Bypass via DigestValue Comment
Weaknesses CWE-347
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-03-15T20:45:45.927Z

Reserved: 2025-03-11T14:23:00.474Z

Link: CVE-2025-29775

cve-icon Vulnrichment

Updated: 2025-03-15T20:45:45.927Z

cve-icon NVD

Status : Received

Published: 2025-03-14T18:15:32.180

Modified: 2025-03-15T21:15:35.367

Link: CVE-2025-29775

cve-icon Redhat

Severity : Important

Publid Date: 2025-03-14T17:11:05Z

Links: CVE-2025-29775 - Bugzilla