LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-4600 - Vulnerability Analysis

HighCVSS: 7.4

Last Updated: March 23, 2026

jsrsasign - Broken Authentication

Published: March 23, 2026Updated: March 23, 2026PoC AvailableRemote Exploitable

Overview

jsrsasign < 11.1.1 contains an improper verification of cryptographic signature caused by lack of DSA domain-parameter validation in KJUR.crypto.DSA.setPublic, letting attackers forge DSA signatures or X.509 certificates, exploit requires crafted malicious domain parameters.

Severity & Score

Severity: High
CVSS Score: 7.4

Impact

Attackers can forge DSA signatures or X.509 certificates, bypassing signature verification and compromising trust.

Mitigation

Update to version 11.1.1 or later.

Details

CVE ID
CVE-2026-4600
Severity
High
CVSS Score
7.4
Type
broken_authentication
Status
confirmed

CWE

  • CWE-347

CVSS Metrics

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N