CVE-2024-42459
JavaScript vulnerability analysis and mitigation

Overview

In the Elliptic package version 6.5.6 for Node.js, a vulnerability was discovered related to EDDSA signature malleability. The issue arises from a missing signature length check, which allows zero-valued bytes to be either removed or appended to signatures (NVD, Ubuntu).

Technical details

The vulnerability stems from insufficient validation during the signature verification process. Specifically, the absence of proper length checks in the EDDSA signature implementation allows for signature manipulation by either removing or adding zero-valued bytes. The issue has been assigned a CVSS v3.1 Base Score of 5.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N. The vulnerability has been classified under CWE-347 (Improper Verification of Cryptographic Signature) (NVD).

Impact

The vulnerability could potentially allow attackers to manipulate signatures by adding or removing zero-valued bytes, potentially leading to signature malleability issues. This could affect the integrity of cryptographic operations relying on the Elliptic package's EDDSA implementation (GitHub PR).

Mitigation and workarounds

The issue has been fixed in a pull request that implements proper signature length validation. The fix includes additional checks during the decoding stage of both ECDSA and EDDSA signatures. Users are advised to upgrade to the latest version of the Elliptic package that includes these security fixes (GitHub PR).

Community reactions

The security community has actively engaged with this vulnerability, as evidenced by the GitHub pull request discussion. Multiple security researchers and developers have acknowledged the importance of this fix, and the pull request received significant attention with multiple approvals and positive reactions from the community (GitHub PR).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65959HIGH8.7
  • JavaScriptJavaScript
  • open-webui
NoYesDec 04, 2025
CVE-2025-66032HIGH8.7
  • JavaScriptJavaScript
  • @anthropic-ai/claude-code
NoYesDec 03, 2025
CVE-2025-65945HIGH7.5
  • JavaScriptJavaScript
  • jws
NoYesDec 04, 2025
CVE-2025-66404MEDIUM6.4
  • JavaScriptJavaScript
  • mcp-server-kubernetes
NoYesDec 03, 2025
CVE-2025-66479LOW1.8
  • JavaScriptJavaScript
  • @anthropic-ai/sandbox-runtime
NoYesDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management