Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33895: CWE-347: Improper Verification of Cryptographic Signature in digitalbazaar forge

0
High
VulnerabilityCVE-2026-33895cvecve-2026-33895cwe-347
Published: Fri Mar 27 2026 (03/27/2026, 20:47:54 UTC)
Source: CVE Database V5
Vendor/Project: digitalbazaar
Product: forge

Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, Ed25519 signature verification accepts forged non-canonical signatures where the scalar S is not reduced modulo the group order (`S >= L`). A valid signature and its `S + L` variant both verify in forge, while Node.js `crypto.verify` (OpenSSL-backed) rejects the `S + L` variant, as defined by the specification. This class of signature malleability has been exploited in practice to bypass authentication and authorization logic (see CVE-2026-25793, CVE-2022-35961). Applications relying on signature uniqueness (i.e., dedup by signature bytes, replay tracking, signed-object canonicalization checks) may be bypassed. Version 1.4.0 patches the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 21:15:16 UTC

Technical Analysis

The vulnerability identified as CVE-2026-33895 affects the digitalbazaar forge library, a JavaScript implementation of Transport Layer Security (TLS). Specifically, prior to version 1.4.0, the Ed25519 signature verification process in forge improperly accepts non-canonical signatures where the scalar component S is not reduced modulo the group order L (i.e., S >= L). According to the Ed25519 specification, signatures must be canonical to ensure uniqueness and prevent malleability. However, forge's verification accepts both a valid signature and its S + L variant as valid, whereas other implementations such as Node.js's crypto.verify (which relies on OpenSSL) correctly reject the non-canonical variant. This improper verification falls under CWE-347 (Improper Verification of Cryptographic Signature) and enables signature malleability attacks. Such malleability can be exploited to bypass authentication and authorization logic that depends on signature uniqueness, including deduplication by signature bytes, replay tracking, and canonicalization checks of signed objects. Although no known exploits are currently reported in the wild, similar malleability issues have been exploited previously (e.g., CVE-2026-25793, CVE-2022-35961). The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to integrity compromise. The issue is resolved in forge version 1.4.0, which enforces proper canonical signature verification.

Potential Impact

This vulnerability primarily impacts the integrity of cryptographic signature verification in applications using forge versions prior to 1.4.0. Attackers can exploit signature malleability to forge signatures that pass verification, potentially bypassing authentication and authorization controls. This can lead to unauthorized access, privilege escalation, or acceptance of replayed or tampered messages. Systems relying on signature uniqueness for deduplication, replay protection, or canonicalization are particularly vulnerable. Although confidentiality and availability are not directly affected, the integrity compromise can undermine trust in secure communications and signed data. Organizations using forge in security-critical contexts such as TLS implementations, digital signatures, or secure messaging are at risk. The lack of required privileges or user interaction makes exploitation feasible remotely and at scale if the vulnerable library is exposed. While no active exploits are known, the similarity to prior exploited malleability vulnerabilities suggests a realistic threat. Failure to patch may result in compromised security postures and potential regulatory or compliance issues.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade all instances of the digitalbazaar forge library to version 1.4.0 or later, where the issue is patched. Review and audit all cryptographic signature verification code that relies on forge to ensure it does not assume signature uniqueness without proper canonical verification. Implement additional validation layers where feasible, such as cross-checking signatures with alternative cryptographic libraries that enforce canonical forms. For applications using signature deduplication or replay protection, incorporate logic that normalizes signatures to canonical form before comparison to prevent bypass. Monitor dependencies and supply chains for vulnerable versions of forge and enforce strict version controls. Educate developers about cryptographic signature malleability risks and best practices in signature verification. If upgrading immediately is not possible, consider isolating or restricting access to vulnerable components and applying compensating controls such as enhanced logging and anomaly detection for suspicious signature verification events. Maintain awareness of threat intelligence for any emerging exploits targeting this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-24T15:41:47.490Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c6efce3c064ed76ff462eb

Added to database: 3/27/2026, 8:59:58 PM

Last enriched: 3/27/2026, 9:15:16 PM

Last updated: 3/28/2026, 1:16:16 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses