sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature forgery vulnerability exists in the SM2 signature verification logic of sm-crypto prior to version 0.4.0. Under default configurations, an attacker can forge valid signatures for arbitrary public keys. If the message space contains sufficient redundancy, the attacker can fix the prefix of the message associated with the forged signature to satisfy specific formatting requirements. Version 0.4.0 patches the issue.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hpwg-xg7m-3p6m sm-crypto Affected by Signature Forgery in SM2-DSA
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 22 Jan 2026 11:45:00 +0900

Type Values Removed Values Added
Description sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature forgery vulnerability exists in the SM2 signature verification logic of sm-crypto prior to version 0.4.0. Under default configurations, an attacker can forge valid signatures for arbitrary public keys. If the message space contains sufficient redundancy, the attacker can fix the prefix of the message associated with the forged signature to satisfy specific formatting requirements. Version 0.4.0 patches the issue.
Title sm-crypto Affected by Signature Forgery in SM2-DSA
Weaknesses CWE-347
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-22T02:05:43.426Z

Reserved: 2026-01-19T14:49:06.314Z

Link: CVE-2026-23965

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-22T03:15:46.860

Modified: 2026-01-22T03:15:46.860

Link: CVE-2026-23965

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses