Description
xmlseclibs is a library written in PHP for working with XML Encryption and Signatures. Prior to 3.1.5, XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256-gcm lack validation of the authentication tag length. An attacker can use this to brute-force an authentication tag, recover the GHASH key, and decrypt the encrypted nodes. It also allows to forge arbitrary ciphertexts without knowing the encryption key. This vulnerability is fixed in 3.1.5.
Published: 2026-03-13
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Decryption
Action: Immediate Patch
AI Analysis

Impact

xmlseclibs is a PHP library that implements XML Encryption and Signatures. Prior to version 3.1.5, nodes encrypted with AES‑128‑GCM, AES‑192‑GCM, or AES‑256‑GCM do not validate the authentication tag length. The flaw allows an attacker to brute‑force an authentication tag, recover the GHASH key, and decrypt the ciphertext. It also enables forging arbitrary ciphertexts without knowledge of the encryption key, thereby compromising confidentiality of data protected by the library.

Affected Systems

The vulnerability affects the xmlseclibs library provided by robrichards. All releases before 3.1.5 are impacted. Upgrading to version 3.1.5 or a later release mitigates the issue.

Risk and Exploitability

The CVSS score of 8.2 denotes high severity for confidentiality compromise. The EPSS score of less than 1% suggests that exploitation is likely uncommon in the general population. The vulnerability is not listed in the CISA KEV catalog. The CVE description does not specify an attack vector, but it is inferred that supplied crafted XML input to an application using the vulnerable library could trigger the flaw. No public exploits are documented in the provided data.

Generated by OpenCVE AI on March 17, 2026 at 21:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade xmlseclibs to version 3.1.5 or later.

Generated by OpenCVE AI on March 17, 2026 at 21:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4v26-v6cg-g6f9 xmlseclibs: Missing AES-GCM Authentication Tag Validation on Encrypted Nodes Allows for Unauthorized Decryption
History

Tue, 17 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Xmlseclibs Project
Xmlseclibs Project xmlseclibs
CPEs cpe:2.3:a:xmlseclibs_project:xmlseclibs:*:*:*:*:*:*:*:*
Vendors & Products Xmlseclibs Project
Xmlseclibs Project xmlseclibs

Mon, 16 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Robrichards
Robrichards xmlseclibs
Vendors & Products Robrichards
Robrichards xmlseclibs

Fri, 13 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description xmlseclibs is a library written in PHP for working with XML Encryption and Signatures. Prior to 3.1.5, XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256-gcm lack validation of the authentication tag length. An attacker can use this to brute-force an authentication tag, recover the GHASH key, and decrypt the encrypted nodes. It also allows to forge arbitrary ciphertexts without knowing the encryption key. This vulnerability is fixed in 3.1.5.
Title xmlseclibs is Missing AES-GCM Authentication Tag Validation on Encrypted Nodes Allows for Unauthorized Decryption
Weaknesses CWE-354
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}


Subscriptions

Robrichards Xmlseclibs
Xmlseclibs Project Xmlseclibs
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-16T13:45:07.031Z

Reserved: 2026-03-11T21:16:21.660Z

Link: CVE-2026-32313

cve-icon Vulnrichment

Updated: 2026-03-16T13:45:02.497Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:33.837

Modified: 2026-03-17T19:25:41.563

Link: CVE-2026-32313

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:40:06Z

Weaknesses