CVE-2026-4600 in jsrsasigninfo

Summary

Versions of the package jsrsasign before 11.1.1 are vulnerable to Improper Verification of Cryptographic Signature via the DSA domain-parameter validation in KJUR.crypto.DSA.setPublic (and the related DSA/X509 verification flow in src/dsa-2.0.js). An attacker can forge DSA signatures or X.509 certificates that X509.verifySignature() accepts by supplying malicious domain parameters such as g=1, y=1, and a fixed r=1, which make the verification equation true for any hash.

If you want to get best quality of vulnerability data, you may have to visit VulDB.

Responsible

snyk

Reservation

03/22/2026

Disclosure

03/23/2026

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Want to know what is going to be exploited?

We predict KEV entries!