Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qv7w-v773-3xqm | sm-crypto Affected by Signature Malleability in SM2-DSA |
Wed, 25 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:juneandgreen:sm-crypto:*:*:*:*:*:*:*:* |
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juneandgreen
Juneandgreen sm-crypto |
|
| Vendors & Products |
Juneandgreen
Juneandgreen sm-crypto |
Thu, 22 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 Jan 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature malleability vulnerability exists in the SM2 signature verification logic of the sm-crypto library prior to version 0.3.14. An attacker can derive a new valid signature for a previously signed message from an existing signature. Version 0.3.14 patches the issue. | |
| Title | sm-crypto Affected by Signature Malleability in SM2-DSA | |
| Weaknesses | CWE-347 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-22T16:03:58.987Z
Reserved: 2026-01-19T14:49:06.314Z
Link: CVE-2026-23967
Updated: 2026-01-22T16:03:46.053Z
Status : Analyzed
Published: 2026-01-22T03:15:47.167
Modified: 2026-02-25T15:31:26.013
Link: CVE-2026-23967
No data.
OpenCVE Enrichment
Updated: 2026-04-18T04:00:08Z
Github GHSA