CVE-2025-48995

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-48995
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-48995.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-48995
Aliases
Related
Published
2025-06-02T17:15:41Z
Modified
2025-06-18T23:42:54.418118Z
Summary
[none]
Details

SignXML is an implementation of the W3C XML Signature standard in Python. When verifying signatures with X509 certificate validation turned off and HMAC shared secret set (signxml.XMLVerifier.verify(require_x509=False, hmac_key=...), versions of SignXML prior to 4.0.4 are vulnerable to a potential timing attack. The verifier may leak information about the correct HMAC when comparing it with the user supplied hash, allowing users to reconstruct the correct HMAC for any data.

References

Affected packages

Debian:13 / python-signxml

Package

Name
python-signxml
Purl
pkg:deb/debian/python-signxml?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.5+dfsg-1

Affected versions

4.*

4.0.2+dfsg-1
4.0.3+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/xml-security/signxml

Affected ranges

Type
GIT
Repo
https://github.com/xml-security/signxml
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0
v0.1.1
v0.1.2
v0.1.3
v0.1.4
v0.1.5
v0.1.6
v0.1.7
v0.1.8
v0.1.9
v0.2.0
v0.2.2
v0.2.3
v0.2.4
v0.2.5
v0.2.6
v0.2.7
v0.2.8
v0.2.9
v0.3.0
v0.3.1
v0.3.2
v0.3.3
v0.3.4
v0.3.5
v0.3.6
v0.3.7
v0.3.8
v0.3.9
v0.4.0
v0.4.1
v0.4.2
v0.4.4
v0.4.5
v0.4.6
v0.5.0
v0.6.0

v1.*

v1.0.0
v1.0.1
v1.0.2

v2.*

v2.0.0
v2.1.0
v2.1.1
v2.1.2
v2.1.3
v2.1.4
v2.10.0
v2.10.1
v2.2.0
v2.2.1
v2.2.2
v2.2.3
v2.2.4
v2.2.5
v2.2.6
v2.3.0
v2.4.0
v2.5.0
v2.5.1
v2.5.2
v2.6.0
v2.7.0
v2.7.1
v2.7.2
v2.7.3
v2.8.0
v2.8.1
v2.8.2
v2.9.0

v3.*

v3.0.0
v3.0.1
v3.0.2
v3.1.0
v3.1.1
v3.2.0
v3.2.1
v3.2.2

v4.*

v4.0.0
v4.0.1
v4.0.2
v4.0.3