Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15444: CWE-1395 Dependency on Vulnerable Third-Party Component in IAMB Crypt::Sodium::XS

0
Critical
VulnerabilityCVE-2025-15444cvecve-2025-15444cwe-1395
Published: Tue Jan 06 2026 (01/06/2026, 00:22:50 UTC)
Source: CVE Database V5
Vendor/Project: IAMB
Product: Crypt::Sodium::XS

Description

CVE-2025-15444 is a critical vulnerability in the Crypt::Sodium::XS Perl module, which depends on a vulnerable version of libsodium (<= 1. 0. 20). The underlying libsodium flaw (CVE-2025-69277) mishandles validation of elliptic curve points in certain cryptographic operations, potentially allowing invalid points that compromise cryptographic guarantees. This can lead to severe impacts on confidentiality, integrity, and availability without requiring authentication or user interaction. The vulnerability affects all versions of Crypt::Sodium::XS prior to 0. 000042, which updates libsodium to a fixed version released January 3, 2026. European organizations relying on this module for cryptographic functions in Perl applications are at risk, especially in sectors handling sensitive data or critical infrastructure. Mitigation requires immediate upgrading to Crypt::Sodium::XS version 0. 000042 or later and auditing dependent applications for use of vulnerable libsodium versions.

AI-Powered Analysis

AILast updated: 01/13/2026, 01:00:25 UTC

Technical Analysis

CVE-2025-15444 identifies a critical security vulnerability in the Crypt::Sodium::XS Perl module, which incorporates a vulnerable version of the libsodium cryptographic library (versions up to 1.0.20). The root cause lies in libsodium's function crypto_core_ed25519_is_valid_point, which is responsible for verifying whether an elliptic curve point belongs to the main cryptographic group. Due to improper validation logic, certain atypical use cases involving custom cryptography or untrusted input can cause the function to accept invalid points. This flaw undermines the fundamental assumptions of elliptic curve cryptography, potentially allowing attackers to bypass cryptographic protections, leading to unauthorized data disclosure, data tampering, or denial of service. The vulnerability does not require any privileges or user interaction to exploit, making it highly accessible to remote attackers. Crypt::Sodium::XS versions prior to 0.000042 embed libsodium versions released before December 30, 2025, which contain this vulnerability. The fixed libsodium version 1.0.20-stable was released on January 3, 2026, and Crypt::Sodium::XS 0.000042 includes this patched version. The vulnerability is tracked under CWE-1395, indicating dependency on a vulnerable third-party component. Although no known exploits are reported in the wild yet, the critical CVSS score (9.8) reflects the severe risk posed by this flaw to confidentiality, integrity, and availability of systems relying on this module for cryptographic operations.

Potential Impact

For European organizations, the impact of CVE-2025-15444 can be substantial, especially for those using Perl-based applications that depend on Crypt::Sodium::XS for cryptographic functions. The vulnerability compromises the integrity of elliptic curve cryptographic operations, potentially allowing attackers to forge signatures, decrypt sensitive data, or disrupt secure communications. This can lead to data breaches, loss of trust, regulatory non-compliance (e.g., GDPR violations), and operational disruptions. Sectors such as finance, healthcare, government, and critical infrastructure, which often rely on strong cryptography, are particularly at risk. The ease of exploitation without authentication or user interaction increases the threat level, enabling remote attackers to compromise systems silently. Additionally, the dependency on a third-party library means that many applications may be unknowingly vulnerable, complicating detection and remediation efforts. The widespread use of libsodium in cryptographic implementations further amplifies the potential scope of impact across European organizations.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately upgrade Crypt::Sodium::XS to version 0.000042 or later, which includes the patched libsodium 1.0.20-stable version. 2) Conduct a thorough inventory of all Perl applications and dependencies to identify usage of vulnerable Crypt::Sodium::XS versions or direct libsodium dependencies. 3) Audit custom cryptographic implementations that rely on libsodium to ensure they do not use the affected crypto_core_ed25519_is_valid_point function in an unsafe manner. 4) Implement strict input validation and sanitization for any untrusted data fed into cryptographic functions. 5) Monitor security advisories for any emerging exploits or patches related to this vulnerability. 6) Employ runtime application self-protection (RASP) or intrusion detection systems to detect anomalous cryptographic operations. 7) Engage with software vendors and open-source communities to ensure timely updates and patches. 8) Consider cryptographic agility strategies to allow rapid replacement of vulnerable components in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CPANSec
Date Reserved
2026-01-03T22:06:02.639Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c595e3839e44175a2e0cc

Added to database: 1/6/2026, 12:37:50 AM

Last enriched: 1/13/2026, 1:00:25 AM

Last updated: 2/6/2026, 11:44:13 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats