Vulnerability DatabaseGHSA-89v2-g37m-g3ff

GHSA-89v2-g37m-g3ff
Python vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-89v2-g37m-g3ff) affects the aws-encryption-sdk-cli package and involves improper verification of cryptographic signatures. The issue was discovered and published on May 27, 2021, affecting versions < 1.9.0 and versions >= 2.0.0, < 2.2.0. The vulnerability allows streaming of plaintext from signed messages before ECDSA signature validation is completed (GitHub Advisory).

Technical details

The vulnerability stems from the ESDK's streaming mode functionality, where the system allows plaintext streaming of signed messages before proper ECDSA signature validation. While the ESDK implements AES-GCM encryption and verifies all plaintext before release, the premature access to plaintext before signature validation poses security concerns. The issue is classified as having moderate severity and is specifically related to CWE-347 (Improper Verification of Cryptographic Signature) (GitHub Advisory).

Impact

The vulnerability primarily affects non-repudiation capabilities of the system. While there is no direct impact on the integrity of ciphertext or decrypted plaintext, the flaw could allow an actor with trusted KMS permissions to both decrypt and encrypt messages without proper signature validation. This particularly affects scenarios where applications rely on ECDSA signatures for non-repudiation (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in versions 1.9.0 and 2.2.0. Users are strongly recommended to upgrade to these versions. For those using streaming features, it's recommended to either ensure client code reads to the end of the stream before using released plaintext or use the new API for streaming with fallback to non-streaming decrypt API for signed messages. Additionally, users processing ESDK messages from untrusted sources should implement the new maximum encrypted data keys parameter (AWS Docs).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67511CRITICAL9.6
  • PythonPython
  • cai-framework
NoNoDec 09, 2025
CVE-2025-66645HIGH7.5
  • PythonPython
  • nicegui
NoYesDec 09, 2025
GHSA-9rwj-6rc7-p77cHIGH7.3
  • PythonPython
  • langgraph-checkpoint-sqlite
NoYesDec 10, 2025
CVE-2025-67502MEDIUM5.4
  • PythonPython
  • taguette
NoYesDec 10, 2025
CVE-2025-67485MEDIUM5.3
  • PythonPython
  • mad-proxy
NoNoDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management