Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15444: CWE-1395 Dependency on Vulnerable Third-Party Component in IAMB Crypt::Sodium::XS

0
Critical
VulnerabilityCVE-2025-15444cvecve-2025-15444cwe-1395
Published: Tue Jan 06 2026 (01/06/2026, 00:22:50 UTC)
Source: CVE Database V5
Vendor/Project: IAMB
Product: Crypt::Sodium::XS

Description

Crypt::Sodium::XS module versions prior to 0.000042, for Perl, include a vulnerable version of libsodium libsodium <= 1.0.20 or a version of libsodium released before December 30, 2025 contains a vulnerability documented as CVE-2025-69277  https://www.cve.org/CVERecord?id=CVE-2025-69277 . The libsodium vulnerability states: In atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group. 0.000042 includes a version of libsodium updated to 1.0.20-stable, released January 3, 2026, which includes a fix for the vulnerability.

AI-Powered Analysis

AILast updated: 01/06/2026, 00:52:26 UTC

Technical Analysis

CVE-2025-15444 identifies a vulnerability in the Perl module Crypt::Sodium::XS, which depends on the libsodium cryptographic library. Versions of Crypt::Sodium::XS prior to 0.000042 include a vulnerable libsodium version (<= 1.0.20) that mishandles validation of elliptic curve points in the crypto_core_ed25519_is_valid_point function. Specifically, in certain atypical use cases involving custom cryptographic implementations or processing untrusted data, the function incorrectly accepts points not belonging to the main cryptographic group. This flaw can undermine the security assumptions of elliptic curve cryptography, potentially allowing attackers to bypass cryptographic protections, leading to compromised data integrity or confidentiality. The vulnerability is classified under CWE-1395, indicating a dependency on a vulnerable third-party component. The fix was introduced in Crypt::Sodium::XS version 0.000042, which updates libsodium to version 1.0.20-stable released on January 3, 2026, resolving the issue. No public exploits have been reported to date. The vulnerability does not have an assigned CVSS score, but its impact is significant due to the critical role of cryptographic validation in secure communications and data protection. The vulnerability requires specific conditions for exploitation, such as atypical cryptographic usage or untrusted input, limiting its general exploitability but still posing a serious risk in affected environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of cryptographic operations relying on the Crypt::Sodium::XS Perl module. Organizations using this module in security-sensitive applications, such as secure communications, authentication, or data encryption, may experience weakened cryptographic guarantees if the vulnerable libsodium version is used. This could lead to unauthorized data access, data tampering, or bypassing of security controls. The impact is particularly critical in sectors handling sensitive personal data (e.g., finance, healthcare, government) due to strict regulatory requirements under GDPR and other data protection laws. Additionally, organizations employing custom cryptographic implementations or processing untrusted inputs are at higher risk. While availability is less directly affected, the potential for cryptographic failures could indirectly disrupt services relying on secure operations. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits targeting this vulnerability. Prompt patching is essential to maintain trust and compliance in European digital infrastructures.

Mitigation Recommendations

European organizations should immediately audit their use of the Crypt::Sodium::XS Perl module and identify any deployments using versions prior to 0.000042. They must upgrade to version 0.000042 or later, which includes the patched libsodium 1.0.20-stable release. Additionally, organizations should review their cryptographic implementations to ensure they do not rely on atypical or custom uses of the crypto_core_ed25519_is_valid_point function with untrusted inputs. Implementing strict input validation and sanitization for cryptographic parameters can reduce exploitation risk. Security teams should monitor for updates from the IAMB project and libsodium maintainers for any further advisories. Incorporating cryptographic best practices, such as using well-vetted libraries and avoiding custom cryptographic code, will mitigate similar risks. Finally, organizations should conduct penetration testing and code reviews focused on cryptographic components to detect potential misuse or vulnerabilities related to this issue.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CPANSec
Date Reserved
2026-01-03T22:06:02.639Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c595e3839e44175a2e0cc

Added to database: 1/6/2026, 12:37:50 AM

Last enriched: 1/6/2026, 12:52:26 AM

Last updated: 1/8/2026, 10:24:35 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats