tiny-secp256k1 is a tiny secp256k1 native/JS wrapper. Prior to version 1.1.7, a malicious JSON-stringifyable message can be made passing on verify(), when global Buffer is the buffer package. This affects only environments where require('buffer') is the NPM buffer package. Buffer.isBuffer check can be bypassed, resulting in strange objects being accepted as a message, and those messages could trick verify() into returning false-positive true values. This issue has been patched in version 1.1.7.
Metrics
Affected Vendors & Products
References
History
Tue, 01 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 01 Jul 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | tiny-secp256k1 is a tiny secp256k1 native/JS wrapper. Prior to version 1.1.7, a malicious JSON-stringifyable message can be made passing on verify(), when global Buffer is the buffer package. This affects only environments where require('buffer') is the NPM buffer package. Buffer.isBuffer check can be bypassed, resulting in strange objects being accepted as a message, and those messages could trick verify() into returning false-positive true values. This issue has been patched in version 1.1.7. | |
Title | tiny-secp256k1 allows for verify() bypass when running in bundled environment | |
Weaknesses | CWE-347 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-01T02:07:02.922Z
Updated: 2025-07-01T13:18:55.447Z
Reserved: 2024-10-14T13:56:34.810Z
Link: CVE-2024-49365

Updated: 2025-07-01T13:18:02.984Z

Status : Awaiting Analysis
Published: 2025-07-01T03:15:21.327
Modified: 2025-07-03T15:14:12.767
Link: CVE-2024-49365

No data.