Metrics
Affected Vendors & Products
Fri, 04 Apr 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:rhdh:1.4::el9 |
Fri, 28 Mar 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat rhdh |
|
CPEs | cpe:/a:redhat:rhdh:1.5::el9 | |
Vendors & Products |
Redhat
Redhat rhdh |
Thu, 27 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Sat, 15 Mar 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 14 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 14 Mar 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | xml-crypto is an XML digital signature and encryption library for Node.js. An attacker may be able to exploit a vulnerability in versions prior to 6.0.1, 3.2.1, and 2.1.6 to bypass authentication or authorization mechanisms in systems that rely on xml-crypto for verifying signed XML documents. The vulnerability allows an attacker to modify a valid signed XML message in a way that still passes signature verification checks. For example, it could be used to alter critical identity or access control attributes, enabling an attacker to escalate privileges or impersonate another user. Users of versions 6.0.0 and prior should upgrade to version 6.0.1 to receive a fix. Those who are still using v2.x or v3.x should upgrade to patched versions 2.1.6 or 3.2.1, respectively. | |
Title | xml-crypto Vulnerable to XML Signature Verification Bypass via DigestValue Comment | |
Weaknesses | CWE-347 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-15T20:45:45.927Z
Reserved: 2025-03-11T14:23:00.474Z
Link: CVE-2025-29775

Updated: 2025-03-15T20:45:45.927Z

Status : Received
Published: 2025-03-14T18:15:32.180
Modified: 2025-03-15T21:15:35.367
Link: CVE-2025-29775
