Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. tiny-secp256k1
  4. ›
  5. CVE-2024-49365

CVE-2024-49365: tiny-secp256k1 allows for verify() bypass when running in bundled environment

June 30, 2025 (updated July 1, 2025)

A malicious JSON-stringifyable message can be made passing on verify(), when global Buffer is buffer package

References

  • github.com/advisories/GHSA-5vhg-9xg4-cv9m
  • github.com/bitcoinjs/tiny-secp256k1
  • github.com/bitcoinjs/tiny-secp256k1/pull/140
  • github.com/bitcoinjs/tiny-secp256k1/security/advisories/GHSA-5vhg-9xg4-cv9m
  • nvd.nist.gov/vuln/detail/CVE-2024-49365

Code Behaviors & Features

Detect and mitigate CVE-2024-49365 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.1.7

Fixed versions

  • 1.1.7

Solution

Upgrade to version 1.1.7 or above.

Weakness

  • CWE-347: Improper Verification of Cryptographic Signature

Source file

npm/tiny-secp256k1/CVE-2024-49365.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:40 +0000.