CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Signature Verification Bypass in node-forge Library (CVE-2025-12816)

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A high-severity vulnerability (CVE-2025-12816) in the popular node-forge JavaScript cryptography library allows attackers to bypass signature verification by crafting malformed ASN.1 data. The flaw affects versions 1.3.1 and earlier and could lead to authentication bypass, data tampering, and misuse of certificate functions. A patch (version 1.3.2) has been released to address the issue.

Timeline

  1. 26.11.2025 21:32 1 articles · 23h ago

    node-forge Releases Fix for Signature Verification Bypass Flaw

    A high-severity vulnerability (CVE-2025-12816) in node-forge, a popular JavaScript cryptography library, has been patched in version 1.3.2. The flaw allows attackers to bypass signature verification by crafting malformed ASN.1 data, potentially leading to authentication bypass and data tampering. The vulnerability was discovered by Hunter Wodzenski of Palo Alto Networks and responsibly reported to the node-forge developers.

    Show sources

Information Snippets