Vulnerabilities/

tiny-secp256k1 allows for verify() bypass when running in bundled environment

Severity:
High

Description

A malicious JSON-stringifyable message can be made passing on verify(), when global Buffer is buffer package

Recommendation

Update the tiny-secp256k1 package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
tiny-secp256k1
Anything's wrong? Let us know Last updated on July 01, 2025

This issue is available in SmartScanner Professional

See Pricing