Elliptic's ECDSA missing check for whether leading bit of r and s is zero
- Severity:
- Low
Description
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.
Recommendation
Update the elliptic package to the latest compatible version. Followings are version details:
- Affected version(s): >= 2.0.0, <= 6.5.6
- Patched version(s): 6.5.7
References
Related Issues
- jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch - CVE-2026-24001
- vue-template-compiler vulnerable to client-side Cross-Site Scripting (XSS) - CVE-2024-6783
- LangChain serialization injection vulnerability enables secret extraction - CVE-2025-68665
- Valid ECDSA signatures erroneously rejected in Elliptic - CVE-2024-48948
- Tags:
- npm
- elliptic
Anything's wrong? Let us know Last updated on November 04, 2025