Digitalbazaar Forge vulnerabilities
11 known vulnerabilities affecting digitalbazaar/forge.
Total CVEs
11
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH7MEDIUM4
Vulnerabilities
Page 1 of 1
CVE-2026-33896HIGHCVSS 7.4fixed in 1.4.02026-03-27
CVE-2026-33896 [HIGH] CWE-295 CVE-2026-33896: Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScrip
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, `pki.verifyCertificateChain()` does not enforce RFC 5280 basicConstraints requirements when an intermediate certificate lacks both the `basicConstraints` and `keyUsage` extensions. This allows any leaf certificate (without the
nvd
CVE-2026-33891HIGHCVSS 7.5≤ 1.3.3fixed in 1.4.02026-03-27
CVE-2026-33891 [HIGH] CWE-835 CVE-2026-33891: Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScrip
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, a Denial of Service (DoS) vulnerability exists in the node-forge library due to an infinite loop in the BigInteger.modInverse() function (inherited from the bundled jsbn library). When modInverse() is called with a zero value
nvd
CVE-2025-66031HIGHCVSS 8.7fixed in 1.3.22025-11-26
CVE-2025-66031 [HIGH] CWE-674 CVE-2025-66031: Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScrip
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaus
nvd
CVE-2025-66030MEDIUMCVSS 6.3fixed in 1.3.22025-11-26
CVE-2025-66030 [MEDIUM] CWE-190 CVE-2025-66030: Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScrip
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwi
nvd
CVE-2025-12816HIGHCVSS 8.6≤ 1.3.12025-11-25
CVE-2025-12816 [HIGH] CWE-436 CVE-2025-12816: An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and earlier enables
An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and earlier enables unauthenticated attackers to craft ASN.1 structures to desynchronize schema validations, yielding a semantic divergence that may bypass downstream cryptographic verifications and security decisions.
nvd
CVE-2022-35961MEDIUMCVSS 6.5fixed in 1.4.02022-08-15
CVE-2022-35961 [MEDIUM] CWE-354 CVE-2022-35961: OpenZeppelin Contracts is a library for secure smart contract development. The functions `ECDSA.reco
OpenZeppelin Contracts is a library for secure smart contract development. The functions `ECDSA.recover` and `ECDSA.tryRecover` are vulnerable to a kind of signature malleability due to accepting EIP-2098 compact signatures in addition to the traditional 65 byte signature format. This is only an issue for the functions that take a single `bytes` arg
nvd
CVE-2022-24772HIGHCVSS 7.5fixed in 1.3.02022-03-18
CVE-2022-24772 [HIGH] CWE-347 CVE-2022-24772: Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScrip
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a
nvd
CVE-2022-24771HIGHCVSS 7.5fixed in 1.3.0fixed in 1.4.02022-03-18
CVE-2022-24771 [HIGH] CWE-347 CVE-2022-24771: Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScrip
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge
nvd
CVE-2022-24773MEDIUMCVSS 5.3fixed in 1.3.02022-03-18
CVE-2022-24773 [MEDIUM] CWE-347 CVE-2022-24773: Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScrip
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The
nvd
CVE-2022-0122MEDIUMCVSS 6.1fixed in 1.0.02022-01-06
CVE-2022-0122 [MEDIUM] CWE-601 CVE-2022-0122: forge is vulnerable to URL Redirection to Untrusted Site
forge is vulnerable to URL Redirection to Untrusted Site
nvd
CVE-2020-7720HIGHCVSS 7.3fixed in 0.10.02020-09-01
CVE-2020-7720 [HIGH] CWE-1321 CVE-2020-7720: The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via the util.setPath funct
The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via the util.setPath function. Note: Version 0.10.0 is a breaking change removing the vulnerable functions.
nvd