Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2w8x-224x-785m | sjcl is missing point-on-curve validation in sjcl.ecc.basicKey.publicKey |
Tue, 17 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-325 | |
| Metrics |
ssvc
|
Tue, 17 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bitwiseshiftleft
Bitwiseshiftleft sjcl |
|
| Vendors & Products |
Bitwiseshiftleft
Bitwiseshiftleft sjcl |
Tue, 17 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | All versions of the package sjcl are vulnerable to Improper Verification of Cryptographic Signature due to missing point-on-curve validation in sjcl.ecc.basicKey.publicKey(). An attacker can recover a victim's ECDH private key by sending crafted off-curve public keys and observing ECDH outputs. The dhJavaEc() function directly returns the raw x-coordinate of the scalar multiplication result (no hashing), providing a plaintext oracle without requiring any decryption feedback. | |
| Weaknesses | CWE-347 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2026-03-17T13:22:11.049Z
Reserved: 2026-03-16T10:00:53.239Z
Link: CVE-2026-4258
Updated: 2026-03-17T13:21:33.775Z
Status : Awaiting Analysis
Published: 2026-03-17T06:16:18.590
Modified: 2026-03-17T14:20:01.670
Link: CVE-2026-4258
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:49:33Z
Github GHSA