Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Cryptographic Step via the KJUR.crypto.DSA.signWithMessageHash process in the DSA signing implementation. An attacker can recover the private key by forcing r or s to be zero, so the library emits an invalid signature without retrying, and then solves for x from the resulting signature.
References
| Link | Resource |
|---|---|
| https://gist.github.com/Kr0emer/93789fe6efe5519db9692d4ad1dad586 | Exploit Mitigation Third Party Advisory |
| https://github.com/kjur/jsrsasign/commit/0710e392ec35de697ce11e4219c988ba2b5fe0eb | Patch |
| https://github.com/kjur/jsrsasign/pull/645 | Issue Tracking |
| https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-15370941 | Third Party Advisory |
Configurations
History
23 Mar 2026, 16:10
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Jsrsasign Project
Jsrsasign Project jsrsasign |
|
| CPE | cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:* | |
| References | () https://gist.github.com/Kr0emer/93789fe6efe5519db9692d4ad1dad586 - Exploit, Mitigation, Third Party Advisory | |
| References | () https://github.com/kjur/jsrsasign/commit/0710e392ec35de697ce11e4219c988ba2b5fe0eb - Patch | |
| References | () https://github.com/kjur/jsrsasign/pull/645 - Issue Tracking | |
| References | () https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-15370941 - Third Party Advisory |
23 Mar 2026, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-23 06:16
Updated : 2026-03-23 16:10
NVD link : CVE-2026-4601
Mitre link : CVE-2026-4601
CVE.ORG link : CVE-2026-4601
JSON object : View
Products Affected
jsrsasign_project
- jsrsasign
CWE
CWE-325
Missing Cryptographic Step
