Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30910: CWE-190 Integer Overflow or Wraparound in IAMB Crypt::Sodium::XS

0
High
VulnerabilityCVE-2026-30910cvecve-2026-30910cwe-190
Published: Sun Mar 08 2026 (03/08/2026, 00:54:56 UTC)
Source: CVE Database V5
Vendor/Project: IAMB
Product: Crypt::Sodium::XS

Description

CVE-2026-30910 is an integer overflow vulnerability in Crypt::Sodium::XS versions up to 0. 001000 for Perl. The flaw arises because combined AEAD encryption, combined signature creation, and bin2hex functions do not verify that output sizes remain below SIZE_MAX, leading to potential integer wraparound and undersized output buffers. This can cause crashes in bin2hex and certain encryption algorithms, while for aes256gcm encryption and signatures, it may result in buffer overflows. Exploitation requires extremely large input sizes, making attacks unlikely in typical scenarios. No known exploits are currently reported in the wild. The vulnerability affects confidentiality, integrity, and availability due to possible buffer overflows and crashes. Mitigation involves applying patches once available, limiting input sizes, and auditing code for proper size checks. Countries with significant Perl usage in critical infrastructure and software development, such as the United States, Germany, Japan, United Kingdom, Canada, Australia, and France, are most at risk. The severity is assessed as high due to the potential for buffer overflow and crash conditions, despite the low likelihood of exploitation due to input size constraints.

AI-Powered Analysis

AILast updated: 03/08/2026, 01:51:57 UTC

Technical Analysis

CVE-2026-30910 identifies an integer overflow vulnerability in the Crypt::Sodium::XS Perl module, specifically in versions through 0.001000. The vulnerability stems from the failure to validate that the output buffer sizes for combined AEAD encryption, combined signature creation, and bin2hex functions remain below the maximum allowable size (SIZE_MAX). When processing very large input messages, this can cause integer wraparound, resulting in undersized output buffers. For bin2hex and encryption algorithms other than aes256gcm, this leads to crashes due to buffer underrun or invalid memory access. For aes256gcm encryption and signature functions, the undersized buffer can cause buffer overflows, potentially allowing attackers to corrupt memory or execute arbitrary code. The input sizes required to trigger these conditions are extremely large (e.g., input size > SIZE_MAX / 2 for bin2hex, > SIZE_MAX - 32 for aegis encryption), making exploitation difficult in practice. No patches or fixes are currently linked, and no known exploits have been reported. The vulnerability is classified under CWE-190 (Integer Overflow or Wraparound).

Potential Impact

The impact of CVE-2026-30910 includes potential denial of service through application crashes and, more critically, memory corruption via buffer overflows in aes256gcm encryption and signature functions. This can compromise confidentiality and integrity of cryptographic operations, potentially allowing attackers to bypass security guarantees or execute arbitrary code if exploited. Although exploitation requires very large input sizes, systems processing large volumes of data or untrusted inputs could be at risk. Organizations relying on Crypt::Sodium::XS for cryptographic functions in Perl applications, especially those handling sensitive data or operating in security-critical environments, could face service disruption or data compromise. The absence of known exploits reduces immediate risk, but the vulnerability's presence in cryptographic primitives elevates its potential severity.

Mitigation Recommendations

Organizations should monitor for official patches or updates from the IAMB project and apply them promptly once available. In the interim, developers should implement strict input validation to limit message sizes well below thresholds that could trigger integer overflow conditions. Code audits should verify that all buffer size calculations properly check for integer overflows and respect SIZE_MAX limits. Employing fuzz testing and static analysis tools focused on integer overflow detection can help identify similar issues. Where feasible, consider using alternative, well-maintained cryptographic libraries without this vulnerability. Additionally, runtime protections such as AddressSanitizer or similar memory safety tools can help detect and mitigate exploitation attempts during development and testing phases.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CPANSec
Date Reserved
2026-03-07T13:09:20.641Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69acd2e62904315ca32e173c

Added to database: 3/8/2026, 1:37:42 AM

Last enriched: 3/8/2026, 1:51:57 AM

Last updated: 3/8/2026, 3:01:49 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses