Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30910: CWE-190 Integer Overflow or Wraparound in IAMB Crypt::Sodium::XS

0
High
VulnerabilityCVE-2026-30910cvecve-2026-30910cwe-190
Published: Sun Mar 08 2026 (03/08/2026, 00:54:56 UTC)
Source: CVE Database V5
Vendor/Project: IAMB
Product: Crypt::Sodium::XS

Description

Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows. Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryption and signatures, an undersized buffer could lead to buffer overflow. Encountering this issue is unlikely as the message length would need to be very large. For bin2hex the input size would have to be > SIZE_MAX / 2 For aegis encryption the input size would need to be > SIZE_MAX - 32U For other encryption the input size would need to be > SIZE_MAX - 16U For signatures the input size would need to be > SIZE_MAX - 64U

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/15/2026, 09:20:37 UTC

Technical Analysis

CVE-2026-30910 is an integer overflow vulnerability classified under CWE-190 affecting the Perl module Crypt::Sodium::XS through version 0.001000. The flaw arises because the combined AEAD encryption, combined signature creation, and bin2hex functions do not validate that the output buffer size calculations remain below the maximum size representable by the system (SIZE_MAX). When processing very large input messages, this lack of validation can cause integer wraparound, resulting in an undersized output buffer. For bin2hex, this occurs if the input size exceeds SIZE_MAX / 2; for AEAD encryption, if input size exceeds SIZE_MAX minus 32 bytes; for other encryption algorithms, if input size exceeds SIZE_MAX minus 16 bytes; and for signature creation, if input size exceeds SIZE_MAX minus 64 bytes. The consequence is that the undersized buffer leads to crashes in bin2hex and non-AES256-GCM encryption algorithms, while AES256-GCM encryption and signature functions may experience buffer overflows, potentially leading to memory corruption. Exploitation does not require authentication or user interaction and can be performed remotely (network vector). However, the extremely large input sizes required make exploitation unlikely in typical scenarios. The vulnerability impacts availability primarily through crashes and may impact integrity via buffer overflow-induced memory corruption. No patches were linked at the time of disclosure, and no known exploits have been reported in the wild. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, no required privileges or user interaction, and significant availability impact.

Potential Impact

This vulnerability can cause denial of service conditions by crashing applications using Crypt::Sodium::XS for cryptographic operations, impacting availability. In cases involving AES256-GCM encryption and signature creation, buffer overflows could lead to memory corruption, which might be leveraged for more severe attacks such as arbitrary code execution or data integrity compromise, although no such exploits are known currently. Organizations relying on this Perl module for encryption or signature services could face service disruptions or potential security breaches if processing extremely large inputs. The rarity of such large inputs reduces the likelihood of widespread exploitation, but high-value targets or automated systems processing large data streams could be at risk. The lack of authentication and user interaction requirements increases the attack surface, as attackers can attempt exploitation remotely without credentials. Overall, the threat primarily affects availability and potentially integrity, with confidentiality impact considered negligible.

Mitigation Recommendations

Organizations should monitor for official patches or updates from the Crypt::Sodium::XS maintainers and apply them promptly once available. Until patches are released, implement strict input validation to reject or limit message sizes well below the thresholds that trigger integer wraparound (e.g., significantly less than SIZE_MAX / 2 for bin2hex and corresponding limits for encryption and signature functions). Employ runtime protections such as memory safety tools or address sanitizers during development and testing to detect potential buffer overflows. Review and audit any custom code interfacing with Crypt::Sodium::XS to ensure it does not inadvertently pass large inputs that could trigger the vulnerability. Consider isolating or sandboxing services using this module to limit impact in case of exploitation. Maintain robust monitoring and logging to detect abnormal crashes or memory corruption events that could indicate attempted exploitation. Finally, educate developers and security teams about the risks of integer overflows in cryptographic libraries and the importance of input size checks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CPANSec
Date Reserved
2026-03-07T13:09:20.641Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69acd2e62904315ca32e173c

Added to database: 3/8/2026, 1:37:42 AM

Last enriched: 3/15/2026, 9:20:37 AM

Last updated: 4/21/2026, 8:26:37 PM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses