Vulnerability DatabaseGHSA-qr9h-x63w-vqfm

GHSA-qr9h-x63w-vqfm
Rust vulnerability analysis and mitigation

Overview

A vulnerability in OpenMLS library (GHSA-qr9h-x63w-vqfm) was discovered that prevented private key material from being properly updated in storage during message processing. The bug affects versions up to and including 0.7.0, with version 0.7.1 providing the fix. The vulnerability specifically impacts the keys stored in the MLS secret tree, which are used for decryption of private MLS messages (GitHub Advisory).

Technical details

The vulnerability scope is limited to private messages (application and handshake messages) received in groups, confined to one epoch, with effects resetting after each epoch transition. Within each epoch, there is a maximum number of private messages per sender (default 1000) that can be skipped before an error occurs. The bug causes the library to incorrectly indicate that private messages have been processed when they haven't, potentially leading to processing errors. The vulnerability has a CVSS v4.0 score of 4.1 (Moderate), with metrics indicating Local attack vector, High attack complexity, and High privileges required (GitHub Advisory).

Impact

The security impact is significant when an adversary gains access to the client's state, though the exploitation risk is relatively low in typical use cases. The vulnerability allows decryption of more messages than intended, up to the maximumforwarddistance additional messages per sender in the current epoch. This compromises forward secrecy, as messages previously considered secure become vulnerable to decryption (GitHub Advisory).

Mitigation and workarounds

Several mitigation strategies are available: 1) Message encryption secrets are automatically deleted during epoch transitions if not configured to retain past secrets. 2) Increasing update/commit frequency helps minimize the compromise window. 3) Creating private messages for each sender of previously received messages using the same MlsGroup object without reloading from storage ensures proper key updates. Post-patch, affected clients are fully healed upon entering the next epoch or when pre-patch epoch state drops out of the retention window (GitHub Advisory).

Community reactions

The vulnerability was responsibly disclosed and addressed, with acknowledgments to Ege Erdogan and Fatih Ergin for reporting the issue (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61588CRITICAL9.3
  • RustRust
  • risc0-aggregation
NoYesOct 02, 2025
CVE-2025-59825MEDIUM6.1
  • RustRust
  • uv-debuginfo
NoYesSep 23, 2025
CVE-2025-11060MEDIUM5.7
  • RustRust
  • surrealdb
NoYesSep 26, 2025
GHSA-qr9h-x63w-vqfmMEDIUM4.1
  • RustRust
  • openmls
NoYesSep 26, 2025
GHSA-mm7x-qfjj-5g2cLOW1.7
  • RustRust
  • ammonia
NoYesSep 22, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management