Jan 1, 2026·6 min read·43 visits
The `cipher-base` package, a dependency of widely used libraries like `crypto-browserify`, failed to correctly handle `TypedArray` inputs. This improper validation allows attackers to pass malicious data structures that "rewind" or corrupt the internal hash state, leading to potential signature forgeries and collision attacks in browser environments.
A critical flaw in the foundational `cipher-base` package allows attackers to manipulate cryptographic states and bypass integrity checks in browser-based applications.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
cipher-base crypto-browserify ecosystem | <= 1.0.4 | 1.0.5 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-20 (Improper Input Validation) |
| CVSS | 9.1 (Critical) |
| Attack Vector | Network / Local (Context Dependent) |
| Impact | Integrity Violation / State Manipulation |
| Root Cause | Type Confusion in Buffer Handling |
| Fix Version | 1.0.5 |
The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.