Improper Verification of Cryptographic Signature (GHSA-7r96-8g3x-g36m)
- Severity:
- High
Description
The verifyWithMessage method of tEnvoyNaClSigningKey always returns true for any signature of a SHA-512 hash matching the SHA-512 hash of the message even if the signature is invalid.
Recommendation
Update the tenvoy package to the latest compatible version. Followings are version details:
- Affected version(s): < 7.0.3
- Patched version(s): 7.0.3
References
Related Issues
- Strapi Password Hashing is Missing Maximum Password Length Validation - CVE-2025-25298
- DuckDB NPM packages 1.3.3 and 1.29.2 briefly compromised with malware - CVE-2025-59037
- Payload does not invalidate JWTs after log out (GHSA-5v66-m237-hwf7) 2 - CVE-2025-4643
- The AuthKit React Router Library rendered sensitive auth data in HTML - CVE-2025-55008
- Tags:
- npm
- tenvoy
Anything's wrong? Let us know Last updated on January 09, 2023