CVE-2026-4600

ADVISORY - github

Summary

Versions of the package jsrsasign before 11.1.1 are vulnerable to Improper Verification of Cryptographic Signature via the DSA domain-parameter validation in KJUR.crypto.DSA.setPublic (and the related DSA/X509 verification flow in src/dsa-2.0.js). An attacker can forge DSA signatures or X.509 certificates that X509.verifySignature() accepts by supplying malicious domain parameters such as g=1, y=1, and a fixed r=1, which make the verification equation true for any hash.

EPSS Score: 0.0001 (0.011)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Improper Verification of Cryptographic Signature

ADVISORY - github

Improper Verification of Cryptographic Signature

ADVISORY - redhat

Improper Verification of Cryptographic Signature


NIST

CREATED

UPDATED

ADVISORY IDCVE-2026-4600
EXPLOITABILITY SCORE

2.2

EXPLOITS FOUND
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

9.1critical

GitHub

CREATED

UPDATED

EXPLOITABILITY SCORE

2.2

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

8.1high

Red Hat

CREATED

UPDATED

ADVISORY IDCVE-2026-4600
EXPLOITABILITY SCORE

3.9

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

8.2high