tiny-secp256k1 vulnerable to private key extraction when signing a malicious JSON-stringifyable message in bundled envir
- Severity:
- High
Description
Private key can be extracted on signing a malicious JSON-stringifiable object, when global Buffer is buffer package
Recommendation
Update the tiny-secp256k1 package to the latest compatible version. Followings are version details:
- Affected version(s): <= 1.1.6
- Patched version(s): 1.1.7
References
Related Issues
- Vega Cross-Site Scripting (XSS) via expressions abusing toString calls in environments using the VEGA_DEBUG global varia - CVE-2025-59840
- webpack-dev-server users' source code may be stolen when they access a malicious web site with non-Chromium based browse - CVE-2025-30360
- Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability (GHSA-m5vv-6r4h-3vj9) - CVE-2024-35255
- tiny-secp256k1 allows for verify() bypass when running in bundled environment - CVE-2024-49365
- Tags:
- npm
- tiny-secp256k1
Anything's wrong? Let us know Last updated on July 01, 2025