CVE-2025-64767: @hpke/core reuses AEAD nonces
(updated )
The public SenderContext Seal() API has a race condition which allows for the same AEAD nonce to be re-used for multiple Seal() calls. This can lead to complete loss of Confidentiality and Integrity of the produced messages.
References
- github.com/advisories/GHSA-73g8-5h73-26h4
- github.com/dajiaji/hpke-js
- github.com/dajiaji/hpke-js/blob/b7fd3592c7c08660c98289d67c6bb7f891af75c4/packages/core/src/senderContext.ts
- github.com/dajiaji/hpke-js/commit/94a767c9b9f37ce48d5cd86f7017d8cacd294aaf
- github.com/dajiaji/hpke-js/security/advisories/GHSA-73g8-5h73-26h4
- nvd.nist.gov/vuln/detail/CVE-2025-64767
Code Behaviors & Features
Detect and mitigate CVE-2025-64767 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →