CVE-2026-33894
Forge has signature forgery in RSA-PKCS due to ASN.1 extra field
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, RSASSA PKCS#1 v1.5 signature verification accepts forged signatures for low public exponent keys (e=3). Attackers can forge signatures by stuffing βgarbageβ bytes within the ASN structure in order to construct a signature that passes verification, enabling Bleichenbacher style forgery. This issue is similar to CVE-2022-24771, but adds bytes in an addition field within the ASN structure, rather than outside of it. Additionally, forge does not validate that signatures include a minimum of 8 bytes of padding as defined by the specification, providing attackers additional space to construct Bleichenbacher forgeries. Version 1.4.0 patches the issue.
| CWE | CWE-347 CWE-20 |
| Vendor | digitalbazaar |
| Product | forge |
| Published | Mar 27, 2026 |
| Last Updated | Mar 31, 2026 |
Get instant alerts for digitalbazaar forge
Be the first to know when new high vulnerabilities affecting digitalbazaar forge are published β delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N