๐Ÿ” CVE Alert

CVE-2026-33895

HIGH 7.5

Forge has signature forgery in Ed25519 due to missing S > L check

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
10th

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, Ed25519 signature verification accepts forged non-canonical signatures where the scalar S is not reduced modulo the group order (`S >= L`). A valid signature and its `S + L` variant both verify in forge, while Node.js `crypto.verify` (OpenSSL-backed) rejects the `S + L` variant, as defined by the specification. This class of signature malleability has been exploited in practice to bypass authentication and authorization logic (see CVE-2026-25793, CVE-2022-35961). Applications relying on signature uniqueness (i.e., dedup by signature bytes, replay tracking, signed-object canonicalization checks) may be bypassed. Version 1.4.0 patches the issue.

CWE CWE-347
Vendor digitalbazaar
Product forge
Published Mar 27, 2026
Last Updated Mar 31, 2026
Stay Ahead of the Next One

Get instant alerts for digitalbazaar forge

Be the first to know when new high vulnerabilities affecting digitalbazaar forge are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None

Affected Versions

digitalbazaar / forge
< 1.4.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/digitalbazaar/forge/security/advisories/GHSA-q67f-28xg-22rw github.com: https://github.com/digitalbazaar/forge/commit/bdecf11571c9f1a487cc0fe72fe78ff6dfa96b85 datatracker.ietf.org: https://datatracker.ietf.org/doc/html/rfc8032#section-8.4