Cyber Posture

CVE-2026-23965

High

Published: 22 January 2026

Published
22 January 2026
Modified
25 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0001 1.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23965 is a high-severity Improper Verification of Cryptographic Signature (CWE-347) vulnerability in Juneandgreen Sm-Crypto. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 1.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-347

Requires verification of digital signatures using organization-approved certificates before installation, directly preventing improper verification of cryptographic signatures.

addresses: CWE-347

Component authenticity commonly depends on cryptographic signatures; the control enforces proper verification of those signatures.

addresses: CWE-347

PKI certificates under an approved policy require cryptographic signature verification on issuance and validation.

addresses: CWE-347

Requires cryptographic signatures on authoritative data and support for verifying the chain of trust.

addresses: CWE-347

Mandates verification of cryptographic signatures (e.g., DNSSEC RRSIG) on resolution responses, addressing missing or bypassed signature checks.

addresses: CWE-347

Integrity tools commonly rely on cryptographic signatures whose improper validation this weakness covers.

addresses: CWE-347

Authenticity validation commonly relies on cryptographic signature or certificate checks that this control enforces.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote unauthenticated signature forgery in a cryptographic library directly enables exploitation of public-facing applications relying on SM2 signature verification for auth/integrity.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A signature forgery vulnerability exists in the SM2 signature verification logic of sm-crypto prior to version 0.4.0. Under default configurations, an attacker can forge valid signatures for…

more

arbitrary public keys. If the message space contains sufficient redundancy, the attacker can fix the prefix of the message associated with the forged signature to satisfy specific formatting requirements. Version 0.4.0 patches the issue.

Deeper analysisAI

CVE-2026-23965 is a signature forgery vulnerability in the SM2 signature verification logic of the sm-crypto JavaScript library, which provides implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. The flaw affects versions of sm-crypto prior to 0.4.0 and is classified under CWE-347. It was published on 2026-01-22 with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), highlighting high integrity impact.

Remote attackers require no privileges or user interaction to exploit the vulnerability under default configurations. They can forge valid SM2 signatures for arbitrary public keys, potentially bypassing authentication or integrity checks in applications relying on the library. If the message space contains sufficient redundancy, attackers can fix the prefix of the associated message to satisfy specific formatting requirements, enabling targeted forgery.

The issue is patched in sm-crypto version 0.4.0. Security practitioners should upgrade to this version immediately. Further details, including the patch commit, are available at https://github.com/JuneAndGreen/sm-crypto/commit/85295a859d0766222d12ce2be3e6fce7b438b510, and the GitHub security advisory at https://github.com/JuneAndGreen/sm-crypto/security/advisories/GHSA-hpwg-xg7m-3p6m.

Details

CWE(s)

Affected Products

juneandgreen
sm-crypto
≤ 0.4.0

CVEs Like This One

CVE-2026-23967Same product: Juneandgreen Sm-Crypto
CVE-2026-23966Same product: Juneandgreen Sm-Crypto
CVE-2025-27773Shared CWE-347
CVE-2026-5466Shared CWE-347
CVE-2026-38651Shared CWE-347
CVE-2026-34377Shared CWE-347
CVE-2026-20997Shared CWE-347
CVE-2026-24032Shared CWE-347
CVE-2026-0750Shared CWE-347
CVE-2026-5050Shared CWE-347

References