Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-73g8-5h73-26h4 | @hpke/core reuses AEAD nonces |
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dajiaji
Dajiaji hpke-js |
|
| Vendors & Products |
Dajiaji
Dajiaji hpke-js |
Fri, 21 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 21 Nov 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | hpke-js is a Hybrid Public Key Encryption (HPKE) module built on top of Web Cryptography API. Prior to version 1.7.5, the public SenderContext Seal() API has a race condition which allows for the same AEAD nonce to be re-used for multiple Seal() calls. This can lead to complete loss of Confidentiality and Integrity of the produced messages. This issue has been patched in version 1.7.5. | |
| Title | hpke-js reuses AEAD nonces | |
| Weaknesses | CWE-323 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-21T19:01:11.833Z
Reserved: 2025-11-10T22:29:34.877Z
Link: CVE-2025-64767
Updated: 2025-11-21T19:01:02.913Z
Status : Deferred
Published: 2025-11-21T19:16:03.497
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-64767
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:08:29Z
Github GHSA