Vulnerability DatabaseGHSA-9wx7-jrvc-28mm

GHSA-9wx7-jrvc-28mm
JavaScript vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-9wx7-jrvc-28mm) affects Stark Bank ECDSA libraries across multiple platforms including Java (com.starkbank:ecdsa-java v1.0.0), Python (starkbank-ecdsa < 2.0.1), .NET (starkbank-ecdsa v1.3.1), and Node.js (starkbank-ecdsa v1.1.2). The high-severity vulnerability was discovered and disclosed on November 8, 2021, allowing attackers to forge signatures on arbitrary messages that would verify for any public key (GitHub Advisory).

Technical details

The vulnerability stems from missing signature validation checks in the ECDSA implementation. Specifically, the libraries failed to verify that signature components (r and s) were within the valid range of 1 to N-1, where N is the order of the curve. This oversight was addressed by adding range checks for signature.r and signature.s values (ECDSA Python).

Impact

The vulnerability could allow attackers to authenticate as any user within the Stark Bank platform and bypass signature verification needed to perform critical operations such as sending payments and transferring funds. Additionally, other projects using these libraries could be impacted in various unforeseen ways due to the ability to forge signatures (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in updated versions of the libraries: Java (v1.0.1), Python (v2.0.1), .NET (v1.3.2), and Node.js (v1.1.3). Users should upgrade to these patched versions to prevent signature forgery attacks (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67731HIGH8.7
  • JavaScriptJavaScript
  • servify-express
NoYesDec 12, 2025
CVE-2025-67718HIGH8.7
  • JavaScriptJavaScript
  • formio
NoYesDec 11, 2025
CVE-2025-65513HIGH7.5
  • JavaScriptJavaScript
  • mcp-fetch-server
NoNoDec 09, 2025
CVE-2025-67716MEDIUM5.7
  • JavaScriptJavaScript
  • @auth0/nextjs-auth0
NoYesDec 11, 2025
CVE-2025-67490MEDIUM5.4
  • JavaScriptJavaScript
  • @auth0/nextjs-auth0
NoYesDec 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management