GHSA-27w2-87xv-37c6

Suggest an improvement
Source
https://github.com/advisories/GHSA-27w2-87xv-37c6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-27w2-87xv-37c6/GHSA-27w2-87xv-37c6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-27w2-87xv-37c6
Aliases
  • CVE-2026-40092
Published
2026-05-15T16:31:22Z
Modified
2026-05-15T16:46:22.992739Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
nimiq-keys: Unchecked Ed25519 signature length in TaggedPublicKey::verify causes remote node panic via DHT
Details

Impact

A malicious network peer can crash any Nimiq full node by publishing a crafted Kademlia DHT record containing a TaggedSigned<ValidatorRecord, KeyPair> with a signature field whose byte length is not exactly 64. When the victim node's DHT verifier calls TaggedSigned::verify, execution reaches Ed25519Signature::from_bytes(sig).unwrap() in the TaggedPublicKey implementation for Ed25519PublicKey. The from_bytes call fails because ed25519_zebra::Signature::try_from rejects slices not 64 bytes, and the unwrap() panics. The BLS TaggedPublicKey implementation correctly returns false on error; only the Ed25519 implementation panics.

Patches

The patch for this vulnerability is formally released as part of v1.4.0.

Workarounds

No known workarounds.

Resources

See PR.

Database specific
{
    "github_reviewed_at": "2026-05-15T16:31:22Z",
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-252"
    ],
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

crates.io / nimiq-keys

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.2.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-27w2-87xv-37c6/GHSA-27w2-87xv-37c6.json"