Description
sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature malleability vulnerability exists in the SM2 signature verification logic of the sm-crypto library prior to version 0.3.14. An attacker can derive a new valid signature for a previously signed message from an existing signature. Version 0.3.14 patches the issue.
Published: 2026-01-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Signature Forgery
Action: Apply Patch
AI Analysis

Impact

sm-crypto contains a signature malleability flaw in its SM2 signature verification routine that allows an attacker to compute a new valid signature from an existing one. The weakness enables forging of digital signatures, thereby undermining the authentication guarantees of any system that relies on SM2 signatures for integrity or authorization. This is a classic example of improper handling of signature malleability, classified as CWE-347.

Affected Systems

The vulnerability applies to the Jun eAndGreen sm-crypto library in all releases prior to version 0.3.14. The affected product is the JavaScript implementation of Chinese cryptographic algorithms SM2, SM3, and SM4 provided by the JuneAndGreen sm-crypto repository. Upgrading to 0.3.14 or later addresses the issue.

Risk and Exploitability

The CVSS score of 7.5 places the flaw in the high‑severity range, reflecting a significant impact should it be exploited. The current EPSS score is below 1 %, indicating that exploitation attempts are unlikely at present, and the vulnerability is not listed in the CISA KEV catalog. It is inferred that an attacker would need possession of a valid SM2 signature and the corresponding message to craft a forged signature, making the attack more likely in controlled or offline environments where such credentials are available.

Generated by OpenCVE AI on April 18, 2026 at 03:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade sm-crypto to version 0.3.14 or later to eliminate the malleability flaw.
  • Re‑verify all critical SM2 signatures that were generated with earlier releases, if possible, to detect any that could have been forged.
  • Implement additional checks to validate SM2 signatures against expected message hashes and reject malformed or altered signatures.
  • If an upgrade is not immediately feasible, limit the use of the SM2 verification routines to trusted environments and monitor for signature forgeries or authentication anomalies.

Generated by OpenCVE AI on April 18, 2026 at 03:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-qv7w-v773-3xqm sm-crypto Affected by Signature Malleability in SM2-DSA
History

Wed, 25 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:juneandgreen:sm-crypto:*:*:*:*:*:*:*:*

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Juneandgreen
Juneandgreen sm-crypto
Vendors & Products Juneandgreen
Juneandgreen sm-crypto

Thu, 22 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 02:45:00 +0000

Type Values Removed Values Added
Description sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature malleability vulnerability exists in the SM2 signature verification logic of the sm-crypto library prior to version 0.3.14. An attacker can derive a new valid signature for a previously signed message from an existing signature. Version 0.3.14 patches the issue.
Title sm-crypto Affected by Signature Malleability in SM2-DSA
Weaknesses CWE-347
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Juneandgreen Sm-crypto
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-22T16:03:58.987Z

Reserved: 2026-01-19T14:49:06.314Z

Link: CVE-2026-23967

cve-icon Vulnrichment

Updated: 2026-01-22T16:03:46.053Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-22T03:15:47.167

Modified: 2026-02-25T15:31:26.013

Link: CVE-2026-23967

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T04:00:08Z

Weaknesses