0.0
NA
CVE-2025-29774
Apache xml-crypto Signature Bypass Vulnerability
Description

xml-crypto is an XML digital signature and encryption library for Node.js. An attacker may be able to exploit a vulnerability in versions prior to 6.0.1, 3.2.1, and 2.1.6 to bypass authentication or authorization mechanisms in systems that rely on xml-crypto for verifying signed XML documents. The vulnerability allows an attacker to modify a valid signed XML message in a way that still passes signature verification checks. For example, it could be used to alter critical identity or access control attributes, enabling an attacker with a valid account to escalate privileges or impersonate another user. Users of versions 6.0.0 and prior should upgrade to version 6.0.1 to receive a fix. Those who are still using v2.x or v3.x should upgrade to patched versions 2.1.6 or 3.2.1, respectively.

INFO

Published Date :

March 14, 2025, 5:15 p.m.

Last Modified :

March 15, 2025, 9:15 p.m.

Remotely Exploitable :

No

Impact Score :

Exploitability Score :

Public PoC/Exploit Available at Github

CVE-2025-29774 has a 4 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2025-29774 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

No affected product recoded yet

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Explore the Digital Signature Forgery Attack and its impact on Bitcoin transactions. Understand how vulnerabilities threaten multi-signature wallets. 🐙🔒

attack bitcoin btc bug cryptocurrency cryptography cve-2025-29774 ecdsa ecdsa-signature multisig-wallets sighash signature signature-verification translation vulnerability

Jupyter Notebook

Updated: 3 days, 2 hours ago
0 stars 0 fork 0 watcher
Born at : July 26, 2025, 11:14 a.m. This repo has been linked 1 different CVEs too.

How CVE-2025-29774 Vulnerabilities and the SIGHASH_SINGLE Bug Threaten Multi-Signature Wallet Operational Methods with Fake RawTX

bitcoin bitcoin-wallet cryptocurrency cve-2025-29774 attack btc bug cryptography multisig-wallets sighash signature signature-verification translation vulnerability ecdsa ecdsa-signature

Jupyter Notebook

Updated: 1 week, 1 day ago
2 stars 0 fork 0 watcher
Born at : July 23, 2025, 12:42 p.m. This repo has been linked 3 different CVEs too.

Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin

attack bitcoin bitcoin-wallet blockchain cryptocurrencies cryptography ecdsa ecdsa-cryptography ecdsa-signature elliptic-curve-cryptography elliptic-curves privatekey secp256k1 vulnerabilities vulnerability latticeattack btc coin

Shell Python Makefile C C++ Cuda M4 Java Jupyter Notebook Dockerfile

Updated: 3 days ago
213 stars 182 fork 182 watcher
Born at : June 27, 2022, 12:05 p.m. This repo has been linked 5 different CVEs too.

📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.

security cve exploit poc vulnerability

Updated: 1 day, 6 hours ago
7140 stars 1193 fork 1193 watcher
Born at : Dec. 8, 2019, 1:03 p.m. This repo has been linked 815 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-29774 vulnerability anywhere in the article.

  • Daily CyberSecurity
Windows 11 Gets New UI Customization: Reposition System Indicator Bar to Top-Center or Top-Left

Hardware indicator for volume shown at the top center In the latest releases of Windows 11—Build 26200.5661 (Dev Channel) and Build 26120.4452 (Beta Channel)—Microsoft has introduced an enhancement to ... Read more

Published Date: Jun 24, 2025 (1 month, 1 week ago)

The following table lists the changes that have been made to the CVE-2025-29774 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Mar. 15, 2025

    Action Type Old Value New Value
    Added Reference https://workos.com/blog/samlstorm
  • New CVE Received by [email protected]

    Mar. 14, 2025

    Action Type Old Value New Value
    Added Description xml-crypto is an XML digital signature and encryption library for Node.js. An attacker may be able to exploit a vulnerability in versions prior to 6.0.1, 3.2.1, and 2.1.6 to bypass authentication or authorization mechanisms in systems that rely on xml-crypto for verifying signed XML documents. The vulnerability allows an attacker to modify a valid signed XML message in a way that still passes signature verification checks. For example, it could be used to alter critical identity or access control attributes, enabling an attacker with a valid account to escalate privileges or impersonate another user. Users of versions 6.0.0 and prior should upgrade to version 6.0.1 to receive a fix. Those who are still using v2.x or v3.x should upgrade to patched versions 2.1.6 or 3.2.1, respectively.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-347
    Added Reference https://github.com/node-saml/xml-crypto/commit/28f92218ecbb8dcbd238afa4efbbd50302aa9aed
    Added Reference https://github.com/node-saml/xml-crypto/commit/886dc63a8b4bb5ae1db9f41c7854b171eb83aa98
    Added Reference https://github.com/node-saml/xml-crypto/commit/8ac6118ee7978b46aa56b82cbcaa5fca58c93a07
    Added Reference https://github.com/node-saml/xml-crypto/releases/tag/v2.1.6
    Added Reference https://github.com/node-saml/xml-crypto/releases/tag/v3.2.1
    Added Reference https://github.com/node-saml/xml-crypto/releases/tag/v6.0.1
    Added Reference https://github.com/node-saml/xml-crypto/security/advisories/GHSA-9p8x-f768-wp2g
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-29774 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-29774 weaknesses.

NONE - Vulnerability Scoring System