CVE-2026-4603
CVSS Score
5.9
EPSS Score
0.0%
EPSS Percentile
1th
Versions of the package jsrsasign before 11.1.1 are vulnerable to Division by zero due to the RSASetPublic/KEYUTIL parsing path in ext/rsa.js and the BigInteger.modPowInt reduction logic in ext/jsbn.js. An attacker can force RSA public-key operations (e.g., verify and encryption) to collapse to deterministic zero outputs and hide “invalid key” errors by supplying a JWK whose modulus decodes to zero.
| CWE | CWE-369 |
| Vendor | n/a |
| Product | jsrsasign |
| Published | Mar 23, 2026 |
| Last Updated | Mar 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for n/a jsrsasign
Be the first to know when new medium vulnerabilities affecting n/a jsrsasign are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Affected Versions
n/a / jsrsasign
0 < 11.1.1
References
security.snyk.io: https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-15371176 gist.github.com: https://gist.github.com/Kr0emer/5366b7364c4fbf7e754bc377f321e9f3 github.com: https://github.com/kjur/jsrsasign/commit/dc41d49fac4297e7a737a3ef8ebd0aa9c49ef93f github.com: https://github.com/kjur/jsrsasign/pull/649
Credits
Kr0emer