CVE-2026-23966

sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A private key recovery vulnerability exists in the SM2 decryption logic of sm-crypto prior to version 0.3.14. By interacting with the SM2 decryption interface multiple times, an attacker can fully recover the private key within approximately several hundred interactions. Version 0.3.14 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:juneandgreen:sm-crypto:*:*:*:*:*:*:*:*

History

25 Feb 2026, 15:30

Type Values Removed Values Added
CPE cpe:2.3:a:juneandgreen:sm-crypto:*:*:*:*:*:*:*:*
First Time Juneandgreen sm-crypto
Juneandgreen
References () https://github.com/JuneAndGreen/sm-crypto/commit/b1c824e58fdf1eaa73692c124a095819a8c45707 - () https://github.com/JuneAndGreen/sm-crypto/commit/b1c824e58fdf1eaa73692c124a095819a8c45707 - Patch
References () https://github.com/JuneAndGreen/sm-crypto/security/advisories/GHSA-pgx9-497m-6c4v - () https://github.com/JuneAndGreen/sm-crypto/security/advisories/GHSA-pgx9-497m-6c4v - Vendor Advisory

22 Jan 2026, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-22 03:15

Updated : 2026-02-25 15:30


NVD link : CVE-2026-23966

Mitre link : CVE-2026-23966

CVE.ORG link : CVE-2026-23966


JSON object : View

Products Affected

juneandgreen

  • sm-crypto
CWE
CWE-345

Insufficient Verification of Data Authenticity