The implementation of EdDSA in EdDSA-Java (aka ed25519-java) through 0.3.0 exhibits signature malleability and does not satisfy the SUF-CMA (Strong Existential Unforgeability under Chosen Message Attacks) property. This allows attackers to create new valid signatures different from previous signatures for a known message.
{
"nvd_published_at": "2025-03-13T06:15:34Z",
"github_reviewed_at": "2025-03-13T16:24:28Z",
"cwe_ids": [
"CWE-347"
],
"severity": "MODERATE",
"github_reviewed": true
}